syzbot


INFO: task hung in _vm_unmap_aliases (3)

Status: upstream: reported C repro on 2024/01/09 18:18
Subsystems: mm
[Documentation on labels]
Reported-by: syzbot+fe8f8efd070d727de971@syzkaller.appspotmail.com
First crash: 716d, last: 4d03h
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] Monthly mm report (Sep 2025) 0 (1) 2025/09/15 06:54
[syzbot] Monthly mm report (Aug 2025) 0 (1) 2025/08/14 12:42
[syzbot] Monthly mm report (Jul 2025) 0 (1) 2025/07/14 07:23
[syzbot] Monthly mm report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly mm report (Oct 2024) 0 (1) 2024/10/03 09:02
[syzbot] Monthly mm report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] [modules?] INFO: task hung in _vm_unmap_aliases (3) 0 (1) 2024/01/09 18:18
Similar bugs (3)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: task hung in _vm_unmap_aliases kernel 1 1 1856d 1856d 0/29 auto-closed as invalid on 2020/11/17 05:59
linux-5.15 INFO: task hung in _vm_unmap_aliases 1 1 307d 307d 0/3 auto-obsoleted due to no activity on 2025/02/23 10:14
upstream INFO: task hung in _vm_unmap_aliases (2) modules 1 1 1006d 1006d 0/29 auto-obsoleted due to no activity on 2023/04/08 08:01
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/08/12 10:27 26m retest repro upstream OK log
2025/08/12 10:27 26m retest repro upstream OK log
2025/08/12 10:27 26m retest repro upstream OK log
2025/08/12 10:27 26m retest repro upstream OK log
2025/08/12 10:27 26m retest repro upstream OK log
2025/08/12 08:02 26m retest repro upstream OK log
2025/08/12 08:02 26m retest repro upstream OK log
2025/08/12 08:02 26m retest repro upstream OK log
2025/08/12 08:02 26m retest repro upstream OK log
2025/08/12 08:02 26m retest repro upstream OK log

Sample crash report:
INFO: task kworker/1:0:23 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0     state:D stack:0     pid:23    tgid:23    ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400
 r4:83242400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83242400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe11000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8596278c r4:85962400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8596278c r4:830cc080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83242400 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:830cc080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc080 r8:80287e08 r7:df819d50 r6:830cc100 r5:83242400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf879fb0 to 0xdf879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:830cb100
INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a68bd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/1:1:3097 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1     state:D stack:0     pid:3097  tgid:3097  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec991d84 r8:00000002 r7:60000113 r6:ec991d8c r5:83fa8000
 r4:83fa8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83fa8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83fa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8596538c r4:85965000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8596538c r4:847cd980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83fa8000 r8:847cd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847cd980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cd980 r8:80287e08 r7:df92de60 r6:847cd900 r5:83fa8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec991fb0 to 0xec991ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8458d540
INFO: task kworker/1:1:3097 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a6bc2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/1:6:3134 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:6     state:D stack:0     pid:3134  tgid:3134  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9b5d84 r8:00000002 r7:60000013 r6:df9b5d8c r5:83988000
 r4:83988000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83988000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83988000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85962f8c r4:85962c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85962f8c r4:847cde00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83988000 r8:847cde2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847cde00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cde00 r8:80287e08 r7:df971e60 r6:847cde80 r5:83988000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9b5fb0 to 0xdf9b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846ea700
INFO: task kworker/1:6:3134 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a6f39000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/1:7:3137 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:7     state:D stack:0     pid:3137  tgid:3137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8398ec00
 r4:8398ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8398ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855882c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8398ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85687f8c r4:85687c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85687f8c r4:847cdf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8398ec00 r8:847cdf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:847cdf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cdf00 r8:80287e08 r7:df9b5e60 r6:847cd480 r5:8398ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa29fb0 to 0xdfa29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846ea940
INFO: task kworker/1:7:3137 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a7305000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:10:3141 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10    state:D stack:0     pid:3141  tgid:3141  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:841ed400
 r4:841ed400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841ed400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531bd00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e01eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84787b8c r4:84787800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84787b8c r4:847cfd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841ed400 r8:847cfdac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847cfd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cfd80 r8:80287e08 r7:df9c9e60 r6:847cfe00 r5:841ed400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa5dfb0 to 0xdfa5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a6fa80
INFO: task kworker/0:10:3141 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a7a03000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:12:3145 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12    state:D stack:0     pid:3145  tgid:3145  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:841ebc00
 r4:841ebc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841ebc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84787f8c r4:84787c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84787f8c r4:847cff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841ebc00 r8:847cffac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847cff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cff80 r8:80287e08 r7:dfa5de60 r6:847cf900 r5:841ebc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa75fb0 to 0xdfa75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a6fc40
INFO: task kworker/0:12:3145 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a7ce4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:13:3147 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13    state:D stack:0     pid:3147  tgid:3147  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8398c800
 r4:8398c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8398c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9d80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8398c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f578c r4:853f5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f578c r4:847cf880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8398c800 r8:847cf8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847cf880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cf880 r8:80287e08 r7:dfa75e60 r6:847cdc80 r5:8398c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa91fb0 to 0xdfa91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a6fdc0
INFO: task kworker/0:13:3147 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a7ce4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:14:3150 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14    state:D stack:0     pid:3150  tgid:3150  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000013 r6:dfaadd8c r5:84516000
 r4:84516000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84516000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84516000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e015d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f478c r4:853f4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f478c r4:847cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84516000 r8:847cf02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847cf000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847cf000 r8:80287e08 r7:dfa91e60 r6:847cd500 r5:84516000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaadfb0 to 0xdfaadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a64840
INFO: task kworker/0:14:3150 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a8069000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:15:3151 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15    state:D stack:0     pid:3151  tgid:3151  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:84510000
 r4:84510000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84510000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84510000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e056f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d938c r4:856d9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d938c r4:840f1580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84510000 r8:840f15ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:840f1580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:840f1580 r8:80287e08 r7:dfa91e60 r6:847cd200 r5:84510000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab1fb0 to 0xdfab1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a64840
INFO: task kworker/0:15:3151 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a83b3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
INFO: task kworker/0:16:3152 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16    state:D stack:0     pid:3152  tgid:3152  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:84516c00
 r4:84516c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84516c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84516c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f778c r4:853f7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f778c r4:840f1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84516c00 r8:840f152c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:840f1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:840f1500 r8:80287e08 r7:dfab1e60 r6:847cd180 r5:84516c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfab9fb0 to 0xdfab9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845c53c0
INFO: task kworker/0:16:3152 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a861c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3154 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17    state:D stack:0     pid:3154  tgid:3154  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:84513c00
 r4:84513c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84513c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84513c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85419b8c r4:85419800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85419b8c r4:833a4b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84513c00 r8:833a4b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:833a4b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833a4b00 r8:80287e08 r7:dfab1e60 r6:847cd400 r5:84513c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfac5fb0 to 0xdfac5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee040
INFO: task kworker/0:17:3154 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a8dee000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3156 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18    state:D stack:0     pid:3156  tgid:3156  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84511800
 r4:84511800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84511800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84511800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfab3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b68b8c r4:84b68800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b68b8c r4:833a4a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84511800 r8:833a4aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:833a4a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833a4a80 r8:80287e08 r7:dfab1e60 r6:847cd380 r5:84511800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaddfb0 to 0xdfaddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee180
INFO: task kworker/0:18:3156 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a9461000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3158 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19    state:D stack:0     pid:3158  tgid:3158  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84513000
 r4:84513000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84513000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85606040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84513000 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d278c r4:855d2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d278c r4:830b8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84513000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830b8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830b8480 r8:80287e08 r7:dfab1e60 r6:830dee00 r5:84513000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaedfb0 to 0xdfaedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee2c0
INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a9461000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3160 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20    state:D stack:0     pid:3160  tgid:3160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000013 r6:dfafdd8c r5:84515400
 r4:84515400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84515400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84515400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d3f8c r4:855d3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d3f8c r4:830b8400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84515400 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830b8400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830b8400 r8:80287e08 r7:dfab1e60 r6:833be400 r5:84515400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfafdfb0 to 0xdfafdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee3c0
INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a9578000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:8:3163 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:8     state:D stack:0     pid:3163  tgid:3163  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84514800
 r4:84514800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84514800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8453d440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84514800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0135000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a478c r4:856a4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a478c r4:833be100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84514800 r8:833be12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:833be100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:833be100 r8:80287e08 r7:df9b5e60 r6:83826180 r5:84514800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8453d240
INFO: task kworker/1:8:3163 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a9991000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3164 blocked for more than 450 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21    state:D stack:0     pid:3164  tgid:3164  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:84512400
 r4:84512400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84512400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856482c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84512400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c738c r4:856c7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c738c r4:83aedb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84512400 r8:83aedbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:83aedb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83aedb80 r8:80287e08 r7:dfab1e60 r6:8492d680 r5:84512400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb09fb0 to 0xdfb09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee540
INFO: task kworker/0:21:3164 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   a9c8d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3168 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22    state:D stack:0     pid:3168  tgid:3168  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:8416d400
 r4:8416d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8416d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af9c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8416d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb441000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856da78c r4:856da400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856da78c r4:83aedb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8416d400 r8:83aedb2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:83aedb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:83aedb00 r8:80287e08 r7:dfab1e60 r6:843a3000 r5:8416d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb31fb0 to 0xdfb31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845eea40
INFO: task kworker/0:22:3168 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aa1d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:9:3169 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:9     state:D stack:0     pid:3169  tgid:3169  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83fb0c00
 r4:83fb0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83fb0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e5f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83fb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85962b8c r4:85962800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85962b8c r4:84279000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83fb0c00 r8:8427902c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279000 r8:80287e08 r7:df9b5e60 r6:84279080 r5:83fb0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb35fb0 to 0xdfb35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8453d700
INFO: task kworker/1:9:3169 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aa1d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:23:3171 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:23    state:D stack:0     pid:3171  tgid:3171  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:847a3000
 r4:847a3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb59f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b6f8c r4:858b6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b6f8c r4:830cc400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a3000 r8:830cc42c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830cc400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc400 r8:80287e08 r7:dfb31e60 r6:84279100 r5:847a3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb45fb0 to 0xdfb45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee900
INFO: task kworker/0:23:3171 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aa458000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:24:3172 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:24    state:D stack:0     pid:3172  tgid:3172  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:847a1800
 r4:847a1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587bb40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fef8c r4:857fec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:857fef8c r4:830cc380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a1800 r8:830cc3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830cc380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc380 r8:80287e08 r7:dfb45e60 r6:84279180 r5:847a1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb49fb0 to 0xdfb49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845eebc0
INFO: task kworker/0:24:3172 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ab25a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:25:3174 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:25    state:D stack:0     pid:3174  tgid:3174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:847a4800
 r4:847a4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856dbb8c r4:856db800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856dbb8c r4:830cc300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a4800 r8:830cc32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830cc300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc300 r8:80287e08 r7:dfb45e60 r6:84279200 r5:847a4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb51fb0 to 0xdfb51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845eea80
INFO: task kworker/0:25:3174 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ab50d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:26:3176 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:26    state:D stack:0     pid:3176  tgid:3176  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:847a0000
 r4:847a0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b4b8c r4:858b4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b4b8c r4:830cc280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a0000 r8:830cc2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:830cc280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:830cc280 r8:80287e08 r7:dfb45e60 r6:84279280 r5:847a0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb59fb0 to 0xdfb59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845eea80
INFO: task kworker/0:26:3176 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ab50d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:27:3178 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:27    state:D stack:0     pid:3178  tgid:3178  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:847a3c00
 r4:847a3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a37c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebad1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b5f8c r4:858b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b5f8c r4:8439f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a3c00 r8:8439f62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8439f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8439f600 r8:80287e08 r7:dfb45e60 r6:84279300 r5:847a3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb65fb0 to 0xdfb65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845eef00
INFO: task kworker/0:27:3178 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   abb02000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:28:3180 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:28    state:D stack:0     pid:3180  tgid:3180  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:847a5400
 r4:847a5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eaec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb84f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8597c38c r4:8597c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8597c38c r4:8439f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a5400 r8:8439f5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8439f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8439f580 r8:80287e08 r7:dfb45e60 r6:84279380 r5:847a5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb75fb0 to 0xdfb75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846eae80
INFO: task kworker/0:28:3180 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   abf08000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:29:3182 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:29    state:D stack:0     pid:3182  tgid:3182  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:847a2400
 r4:847a2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:847a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb71d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8597f38c r4:8597f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8597f38c r4:84584f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a2400 r8:84584f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:84584f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84584f00 r8:80287e08 r7:dfb75e60 r6:84279400 r5:847a2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb81fb0 to 0xdfb81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee680
INFO: task kworker/0:29:3182 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ac2dc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:30:3184 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:30    state:D stack:0     pid:3184  tgid:3184  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:841eec00
 r4:841eec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841eec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c0580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb911000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8597e78c r4:8597e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8597e78c r4:847b6000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841eec00 r8:847b602c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6000 r8:80287e08 r7:dfb81e60 r6:847b6080 r5:841eec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb69fb0 to 0xdfb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9080
INFO: task kworker/0:30:3184 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ac35a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:31:3186 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:31    state:D stack:0     pid:3186  tgid:3186  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:83b26c00
 r4:83b26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb779000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6bb8c r4:84b6b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6bb8c r4:847b6180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b26c00 r8:847b61ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6180 r8:80287e08 r7:dfb81e60 r6:847b6200 r5:83b26c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb85fb0 to 0xdfb85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9080
INFO: task kworker/0:31:3186 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ac926000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:32:3189 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:32    state:D stack:0     pid:3189  tgid:3189  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:838b6c00
 r4:838b6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:838b6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84603740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:838b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f179000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecb77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8504038c r4:85040000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8504038c r4:847b6280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:838b6c00 r8:847b62ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6280 r8:80287e08 r7:dfb85e60 r6:847b6300 r5:838b6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb91fb0 to 0xdfb91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9340
INFO: task kworker/0:32:3189 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   acd13000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:33:3190 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:33    state:D stack:0     pid:3190  tgid:3190  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:841dd400
 r4:841dd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841dd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8505a38c r4:8505a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8505a38c r4:847b6380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841dd400 r8:847b63ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6380 r8:80287e08 r7:dfb91e60 r6:847b6400 r5:841dd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfb9dfb0 to 0xdfb9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9540
INFO: task kworker/0:33:3190 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ad380000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:34:3193 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:34    state:D stack:0     pid:3193  tgid:3193  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:841d6000
 r4:841d6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841d6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ff00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f2f3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed2f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c2f78c r4:85c2f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c2f78c r4:847b6480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841d6000 r8:847b64ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6480 r8:80287e08 r7:dfb91e60 r6:847b6500 r5:841d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbb5fb0 to 0xdfbb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9640
INFO: task kworker/0:34:3193 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ad380000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:35:3195 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:35    state:D stack:0     pid:3195  tgid:3195  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83a50000
 r4:83a50000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83a50000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84603b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83a50000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859cd78c r4:859cd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:859cd78c r4:847b6580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a50000 r8:847b65ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6580 r8:80287e08 r7:dfbb5e60 r6:847b6600 r5:83a50000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa8dfb0 to 0xdfa8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9700
INFO: task kworker/0:35:3195 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   addda000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:36:3196 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:36    state:D stack:0     pid:3196  tgid:3196  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:841de000
 r4:841de000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:841de000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d9a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:841de000 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859ceb8c r4:859ce800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:859ceb8c r4:847b6680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:841de000 r8:847b66ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6680 r8:80287e08 r7:dfbb5e60 r6:847b6700 r5:841de000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbc9fb0 to 0xdfbc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9700
INFO: task kworker/0:36:3196 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ae409000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:37:3198 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:37    state:D stack:0     pid:3198  tgid:3198  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:84752400
 r4:84752400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84752400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85127cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84752400 r7:00000000 r6:83018000 r5:00001000 r4:7f1db000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:859e6f8c r4:859e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:859e6f8c r4:847b6780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84752400 r8:847b67ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6780 r8:80287e08 r7:dfbb5e60 r6:847b6800 r5:84752400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbd5fb0 to 0xdfbd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d96c0
INFO: task kworker/0:37:3198 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aefac000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:11:3204 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:11    state:D stack:0     pid:3204  tgid:3204  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:847a0c00
 r4:847a0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:847a0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:847a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebecb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8596338c r4:85963000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8596338c r4:84279580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:847a0c00 r8:842795ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279580 r8:80287e08 r7:dfba9e60 r6:84279600 r5:847a0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfbf5fb0 to 0xdfbf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b0200
INFO: task kworker/1:11:3204 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aefac000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:12:3206 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:12    state:D stack:0     pid:3206  tgid:3206  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84755400
 r4:84755400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84755400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84755400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf07000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8596378c r4:85963400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8596378c r4:84279680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84755400 r8:842796ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279680 r8:80287e08 r7:dfba9e60 r6:847b6880 r5:84755400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc0dfb0 to 0xdfc0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b0200
INFO: task kworker/1:12:3206 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   af2cc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:38:3207 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:38    state:D stack:0     pid:3207  tgid:3207  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84756c00
 r4:84756c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84756c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85936600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84756c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bc578c r4:85bc5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85bc578c r4:847b6900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84756c00 r8:847b692c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6900 r8:80287e08 r7:dfbb5e60 r6:847b6980 r5:84756c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc1dfb0 to 0xdfc1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9cc0
INFO: task kworker/0:38:3207 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   af9d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:13:3208 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:13    state:D stack:0     pid:3208  tgid:3208  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84751800
 r4:84751800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84751800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84751800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85963b8c r4:85963800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85963b8c r4:84279700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84751800 r8:8427972c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279700 r8:80287e08 r7:dfba9e60 r6:847b6a00 r5:84751800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc21fb0 to 0xdfc21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b0440
INFO: task kworker/1:13:3208 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   afbd8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:14:3210 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:14    state:D stack:0     pid:3210  tgid:3210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:84754800
 r4:84754800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84754800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84754800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8596438c r4:85964000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8596438c r4:84279780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84754800 r8:842797ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279780 r8:80287e08 r7:dfba9e60 r6:847b6a80 r5:84754800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc31fb0 to 0xdfc31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b0580
INFO: task kworker/1:14:3210 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   aff82000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:15:3213 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:15    state:D stack:0     pid:3213  tgid:3213  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:84750000
 r4:84750000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84750000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6a700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84750000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebfa7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85964b8c r4:85964800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85964b8c r4:84279800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84750000 r8:8427982c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84279800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84279800 r8:80287e08 r7:dfba9e60 r6:847b6b00 r5:84750000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc41fb0 to 0xdfc41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b06c0
INFO: task kworker/1:15:3213 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b0104000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:39:3215 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:39    state:D stack:0     pid:3215  tgid:3215  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84753000
 r4:84753000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84753000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851106c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84753000 r7:00000000 r6:83018000 r5:00001000 r4:7f34f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed73b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bc6f8c r4:85bc6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85bc6f8c r4:847b6b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84753000 r8:847b6bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6b80 r8:80287e08 r7:dfbb5e60 r6:847b6c00 r5:84753000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc3dfb0 to 0xdfc3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b3480
INFO: task kworker/0:39:3215 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b0414000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:40:3218 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:40    state:D stack:0     pid:3218  tgid:3218  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83a56c00
 r4:83a56c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83a56c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f359000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eca4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85bc7b8c r4:85bc7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85bc7b8c r4:847b6c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a56c00 r8:847b6cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6c80 r8:80287e08 r7:dfc3de60 r6:847b6d00 r5:83a56c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc61fb0 to 0xdfc61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b36c0
INFO: task kworker/0:40:3218 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b0810000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:41:3220 blocked for more than 451 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:41    state:D stack:0     pid:3220  tgid:3220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:83b39800
 r4:83b39800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b39800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc6de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fb80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b39800 r7:00000000 r6:83018000 r5:00001000 r4:7f423000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecb3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9878c r4:85c98400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9878c r4:847b6d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b39800 r8:847b6dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6d80 r8:80287e08 r7:dfc61e60 r6:847b6e00 r5:83b39800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc6dfb0 to 0xdfc6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b3940
INFO: task kworker/0:41:3220 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b0a05000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:42:3224 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:42    state:D stack:0     pid:3224  tgid:3224  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:83b38c00
 r4:83b38c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b38c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b38c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed20d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c5ff8c r4:85c5fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c5ff8c r4:847b6f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b38c00 r8:847b6f2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:847b6f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:847b6f00 r8:80287e08 r7:dfc6de60 r6:847b6f80 r5:83b38c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc89fb0 to 0xdfc89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b3c80
INFO: task kworker/0:42:3224 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b0f61000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:43:3225 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:43    state:D stack:0     pid:3225  tgid:3225  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:83b3c800
 r4:83b3c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b3c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845d98c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f43d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9a8000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9b38c r4:85c9b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9b38c r4:8455c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b3c800 r8:8455c02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c000 r8:80287e08 r7:dfc6de60 r6:8455c080 r5:83b3c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc8dfb0 to 0xdfc8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b3c80
INFO: task kworker/0:43:3225 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b1234000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:44:3228 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:44    state:D stack:0     pid:3228  tgid:3228  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df989d84 r8:00000002 r7:60000113 r6:df989d8c r5:83faa400
 r4:83faa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83faa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df989e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d42500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83faa400 r7:00000000 r6:83018000 r5:00001000 r4:7f42d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec02f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9ab8c r4:85c9a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9ab8c r4:8455c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83faa400 r8:8455c12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c100 r8:80287e08 r7:dfc8de60 r6:84279900 r5:83faa400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf989fb0 to 0xdf989ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847b3600
INFO: task kworker/0:44:3228 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b1574000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:45:3230 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:45    state:D stack:0     pid:3230  tgid:3230  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83236000
 r4:83236000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83236000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f42f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df97b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9af8c r4:85c9ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9af8c r4:8455c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83236000 r8:8455c1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c180 r8:80287e08 r7:df989e60 r6:84279980 r5:83236000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d9fb0 to 0xdf9d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845d9f80
INFO: task kworker/0:45:3230 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b19c1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:46:3231 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:46    state:D stack:0     pid:3231  tgid:3231  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:8398d400
 r4:8398d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8398d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d994c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8398d400 r7:00000000 r6:83018000 r5:00001000 r4:7f4e5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed60f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8465878c r4:84658400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8465878c r4:8455c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8398d400 r8:8455c22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c200 r8:80287e08 r7:df989e60 r6:84279a00 r5:8398d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e1fb0 to 0xdf9e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845c56c0
INFO: task kworker/0:46:3231 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b1e57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:47:3233 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:47    state:D stack:0     pid:3233  tgid:3233  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:83b3b000
 r4:83b3b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b3b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f429000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb811000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9a78c r4:85c9a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9a78c r4:8455c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b3b000 r8:8455c2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c280 r8:80287e08 r7:df9e1e60 r6:8455c300 r5:83b3b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc79fb0 to 0xdfc79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84553000
INFO: task kworker/0:47:3233 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b2326000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:48:3235 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:48    state:D stack:0     pid:3235  tgid:3235  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84750c00
 r4:84750c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84750c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d66e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84750c00 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecced000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85c9bb8c r4:85c9b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85c9bb8c r4:8455c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84750c00 r8:8455c3ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c380 r8:80287e08 r7:df9e1e60 r6:8455c400 r5:84750c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9f5fb0 to 0xdf9f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84553000
INFO: task kworker/0:48:3235 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b2326000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:50:3240 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:50    state:D stack:0     pid:3240  tgid:3240  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:8325c800
 r4:8325c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8325c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8325c800 r7:00000000 r6:83018000 r5:00001000 r4:7f49f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84658b8c r4:84658800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84658b8c r4:8455c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8325c800 r8:8455c5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c580 r8:80287e08 r7:df9f9e60 r6:8455c600 r5:8325c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa25fb0 to 0xdfa25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84553340
INFO: task kworker/0:50:3240 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b29a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:51:3241 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:51    state:D stack:0     pid:3241  tgid:3241  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:8325ec00
 r4:8325ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8325ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85216380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8325ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f541000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84658f8c r4:84658c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84658f8c r4:8455c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8325ec00 r8:8455c6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c680 r8:80287e08 r7:df9f9e60 r6:8455c700 r5:8325ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfc09fb0 to 0xdfc09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845533c0
INFO: task kworker/0:51:3241 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b2b71000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:52:3244 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:52    state:D stack:0     pid:3244  tgid:3244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83b03c00
 r4:83b03c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b03c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f587000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eccbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ca938c r4:85ca9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ca938c r4:8455c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b03c00 r8:8455c7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c780 r8:80287e08 r7:df9f9e60 r6:8455c800 r5:83b03c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa65fb0 to 0xdfa65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845537c0
INFO: task kworker/0:52:3244 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b2b71000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:53:3245 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:53    state:D stack:0     pid:3245  tgid:3245  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83b01800
 r4:83b01800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83b01800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85322f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83b01800 r7:00000000 r6:83018000 r5:00001000 r4:7f547000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecbf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85ca9f8c r4:85ca9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85ca9f8c r4:8455c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83b01800 r8:8455c8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c880 r8:80287e08 r7:df9f9e60 r6:8455c900 r5:83b01800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa7dfb0 to 0xdfa7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845537c0
INFO: task kworker/0:53:3245 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b362e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:54:3249 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:54    state:D stack:0     pid:3249  tgid:3249  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83348c00
 r4:83348c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83348c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ffb40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5f9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ecb19000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cc3f8c r4:85cc3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85cc3f8c r4:8455c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83348c00 r8:8455c9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455c980 r8:80287e08 r7:df9f9e60 r6:84279a80 r5:83348c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa55fb0 to 0xdfa55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84553d80
INFO: task kworker/0:54:3249 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b362e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:55:3251 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:55    state:D stack:0     pid:3251  tgid:3251  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83336000
 r4:83336000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:83336000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a8340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:83336000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85de0f8c r4:85de0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85de0f8c r4:8455ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83336000 r8:8455ca2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8455ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8455ca00 r8:80287e08 r7:df9f9e60 r6:84279b00 r5:83336000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfabdfb0 to 0xdfabdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84553d80
INFO: task kworker/0:55:3251 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b3a21000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:425:4464 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:425   state:D stack:0     pid:4464  tgid:4464  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:85383c00
 r4:85383c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85383c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85383c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bfb8c r4:852bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bfb8c r4:8530ab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85383c00 r8:8530abac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ab80 r8:80287e08 r7:eaf15e60 r6:8521a080 r5:85383c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf25fb0 to 0xeaf25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
INFO: task kworker/1:425:4464 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b3d0a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:250:4476 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:250   state:D stack:0     pid:4476  tgid:4476  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf5dd84 r8:00000002 r7:60000113 r6:eaf5dd8c r5:85380c00
 r4:85380c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85380c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf5de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85217040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85380c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527e78c r4:8527e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527e78c r4:8521a580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85380c00 r8:8521a5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a580 r8:80287e08 r7:eaf51e60 r6:8521a600 r5:85380c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf5dfb0 to 0xeaf5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85217c40
INFO: task kworker/0:250:4476 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b3f3d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:251:4479 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:251   state:D stack:0     pid:4479  tgid:4479  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:8534d400
 r4:8534d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8534d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85217ec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8534d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527e38c r4:8527e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527e38c r4:8521a680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8534d400 r8:8521a6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a680 r8:80287e08 r7:eaf5de60 r6:8521a700 r5:8534d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf69fb0 to 0xeaf69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85217cc0
INFO: task kworker/0:251:4479 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b3f3d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:252:4484 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:252   state:D stack:0     pid:4484  tgid:4484  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:85350000
 r4:85350000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85350000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85350000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527ef8c r4:8527ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527ef8c r4:8521a780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85350000 r8:8521a7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a780 r8:80287e08 r7:eaf5de60 r6:8530ac80 r5:85350000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacddfb0 to 0xeacddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85213180
INFO: task kworker/0:252:4484 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b464f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:253:4485 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:253   state:D stack:0     pid:4485  tgid:4485  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:85351800
 r4:85351800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85351800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85351800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527f38c r4:8527f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527f38c r4:8521a800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85351800 r8:8521a82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a800 r8:80287e08 r7:eacdde60 r6:8530ad00 r5:85351800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb5fb0 to 0xeadb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85213180
INFO: task kworker/0:253:4485 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b464f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:254:4486 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:254   state:D stack:0     pid:4486  tgid:4486  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:85353c00
 r4:85353c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85353c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85353c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfde9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527f78c r4:8527f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527f78c r4:8521a880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85353c00 r8:8521a8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a880 r8:80287e08 r7:eadb5e60 r6:8530ad80 r5:85353c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade9fb0 to 0xeade9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85213180
INFO: task kworker/0:254:4486 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b4850000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:255:4487 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:255   state:D stack:0     pid:4487  tgid:4487  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae5dd84 r8:00000002 r7:60000113 r6:eae5dd8c r5:85355400
 r4:85355400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85355400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b3c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85355400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527fb8c r4:8527f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527fb8c r4:8521a900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85355400 r8:8521a92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a900 r8:80287e08 r7:eade9e60 r6:8530ae00 r5:85355400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae5dfb0 to 0xeae5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85213180
INFO: task kworker/0:255:4487 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b4a75000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:256:4489 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:256   state:D stack:0     pid:4489  tgid:4489  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:85356000
 r4:85356000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85356000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b5c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85356000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eace5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8527ff8c r4:8527fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8527ff8c r4:8521a980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85356000 r8:8521a9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8521a980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8521a980 r8:80287e08 r7:eae5de60 r6:8530ae80 r5:85356000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae71fb0 to 0xeae71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85213180
INFO: task kworker/0:256:4489 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b4e52000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4490 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427   state:D stack:0     pid:4490  tgid:4490  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:85353000
 r4:85353000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85353000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae85e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85353000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bff8c r4:852bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bff8c r4:8530af00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85353000 r8:8530af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530af00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530af00 r8:80287e08 r7:eaf25e60 r6:8530af80 r5:85353000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853149c0
INFO: task kworker/1:427:4490 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b515e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:428:4492 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:428   state:D stack:0     pid:4492  tgid:4492  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eae4dd84 r8:00000002 r7:60000113 r6:eae4dd8c r5:85356c00
 r4:85356c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85356c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85356c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0553000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b0b8c r4:853b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b0b8c r4:8530a280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85356c00 r8:8530a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a280 r8:80287e08 r7:eae85e60 r6:851f7000 r5:85356c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae4dfb0 to 0xeae4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8300
INFO: task kworker/1:428:4492 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b533e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:429:4494 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:429   state:D stack:0     pid:4494  tgid:4494  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf75d84 r8:00000002 r7:60000013 r6:eaf75d8c r5:85354800
 r4:85354800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85354800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85354800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0077000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b038c r4:853b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b038c r4:851f7080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85354800 r8:851f70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7080 r8:80287e08 r7:eae4de60 r6:851f7100 r5:85354800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf75fb0 to 0xeaf75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8440
INFO: task kworker/1:429:4494 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b5534000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4497 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430   state:D stack:0     pid:4497  tgid:4497  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000013 r6:eaed5d8c r5:85352400
 r4:85352400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85352400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85352400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b078c r4:853b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b078c r4:851f7180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85352400 r8:851f71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7180 r8:80287e08 r7:eae4de60 r6:851f7200 r5:85352400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaed5fb0 to 0xeaed5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8480
INFO: task kworker/1:430:4497 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b56c5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:431:4498 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:431   state:D stack:0     pid:4498  tgid:4498  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:85302400
 r4:85302400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85302400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85302400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b0f8c r4:853b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b0f8c r4:851f7280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85302400 r8:851f72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7280 r8:80287e08 r7:eae4de60 r6:851f7300 r5:85302400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8740
INFO: task kworker/1:431:4498 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b5b63000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:432:4501 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:432   state:D stack:0     pid:4501  tgid:4501  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:85358000
 r4:85358000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85358000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d0c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85358000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0701000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b1f8c r4:853b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b1f8c r4:851f7380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85358000 r8:851f73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7380 r8:80287e08 r7:eaf85e60 r6:851f7400 r5:85358000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf89fb0 to 0xeaf89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8780
INFO: task kworker/1:432:4501 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b5d3e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:433:4503 blocked for more than 452 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:433   state:D stack:0     pid:4503  tgid:4503  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:85359800
 r4:85359800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85359800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8ac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85359800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e063e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b138c r4:853b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b138c r4:851f7480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85359800 r8:851f74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7480 r8:80287e08 r7:eaf89e60 r6:851f7500 r5:85359800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf91fb0 to 0xeaf91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8780
INFO: task kworker/1:433:4503 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b608e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:434:4504 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:434   state:D stack:0     pid:4504  tgid:4504  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:8535a400
 r4:8535a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8535a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0679000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b178c r4:853b1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b178c r4:851f7580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535a400 r8:851f75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7580 r8:80287e08 r7:eaf89e60 r6:851f7600 r5:8535a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf95fb0 to 0xeaf95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8b80
INFO: task kworker/1:434:4504 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b608e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:435:4506 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:435   state:D stack:0     pid:4506  tgid:4506  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:85358c00
 r4:85358c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85358c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b1b8c r4:853b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b1b8c r4:851f7680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85358c00 r8:851f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7680 r8:80287e08 r7:eaf89e60 r6:851f7700 r5:85358c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf99fb0 to 0xeaf99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:851f8d40
INFO: task kworker/1:435:4506 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b64e5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:436:4509 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:436   state:D stack:0     pid:4509  tgid:4509  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:84792400
 r4:84792400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84792400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0819000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b2b8c r4:853b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b2b8c r4:851f7780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84792400 r8:851f77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7780 r8:80287e08 r7:eaf89e60 r6:8521aa00 r5:84792400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa5fb0 to 0xeafa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d280
INFO: task kworker/1:436:4509 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b67b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:437:4511 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:437   state:D stack:0     pid:4511  tgid:4511  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:84790000
 r4:84790000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84790000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84790000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0789000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b238c r4:853b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b238c r4:851f7800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84790000 r8:851f782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7800 r8:80287e08 r7:eafa5e60 r6:8521aa80 r5:84790000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d180
INFO: task kworker/1:437:4511 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b67b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4513 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438   state:D stack:0     pid:4513  tgid:4513  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:84793000
 r4:84793000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84793000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84793000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b278c r4:853b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b278c r4:851f7880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84793000 r8:851f78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7880 r8:80287e08 r7:eafa5e60 r6:8521ab00 r5:84793000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafadfb0 to 0xeafadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d200
INFO: task kworker/1:438:4513 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b6b24000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4515 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:439   state:D stack:0     pid:4515  tgid:4515  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:84794800
 r4:84794800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84794800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84794800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e093f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b338c r4:853b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b338c r4:851f7900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84794800 r8:851f792c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7900 r8:80287e08 r7:eafa5e60 r6:8521ab80 r5:84794800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d3c0
INFO: task kworker/1:439:4515 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b6d7a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:440:4516 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:440   state:D stack:0     pid:4516  tgid:4516  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:84795400
 r4:84795400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84795400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84795400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b2f8c r4:853b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b2f8c r4:851f7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84795400 r8:851f79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7980 r8:80287e08 r7:eafb5e60 r6:8521ac00 r5:84795400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d3c0
INFO: task kworker/1:440:4516 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b6fc1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4519 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441   state:D stack:0     pid:4519  tgid:4519  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000013 r6:eafc9d8c r5:84793c00
 r4:84793c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84793c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d9c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84793c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e49f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b378c r4:853b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b378c r4:851f7a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84793c00 r8:851f7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7a00 r8:80287e08 r7:eafb5e60 r6:8521ac80 r5:84793c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d500
INFO: task kworker/1:441:4519 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b73b3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4521 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442   state:D stack:0     pid:4521  tgid:4521  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:84796000
 r4:84796000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84796000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520db40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84796000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eabf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b3b8c r4:853b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b3b8c r4:851f7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84796000 r8:851f7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7a80 r8:80287e08 r7:eafc9e60 r6:8521ad00 r5:84796000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafcdfb0 to 0xeafcdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d7c0
INFO: task kworker/1:442:4521 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4522 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443   state:D stack:0     pid:4522  tgid:4522  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:84796c00
 r4:84796c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84796c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b9f8c r4:853b9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b9f8c r4:851f7b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84796c00 r8:851f7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7b00 r8:80287e08 r7:eafcde60 r6:8521ad80 r5:84796c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd1fb0 to 0xeafd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d7c0
INFO: task kworker/1:443:4522 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:444:4524 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:444   state:D stack:0     pid:4524  tgid:4524  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:84790c00
 r4:84790c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84790c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dc40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b3f8c r4:853b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b3f8c r4:851f7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84790c00 r8:851f7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7b80 r8:80287e08 r7:eafd1e60 r6:8521ae00 r5:84790c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520d940
INFO: task kworker/1:444:4524 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b776c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4526 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445   state:D stack:0     pid:4526  tgid:4526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85388c00
 r4:85388c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85388c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dd80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85388c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b838c r4:853b8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b838c r4:851f7c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85388c00 r8:851f7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7c00 r8:80287e08 r7:eafd1e60 r6:8521ae80 r5:85388c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520da80
INFO: task kworker/1:445:4526 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4528 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446   state:D stack:0     pid:4528  tgid:4528  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:85388000
 r4:85388000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85388000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520dec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85388000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b878c r4:853b8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b878c r4:851f7c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85388000 r8:851f7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7c80 r8:80287e08 r7:eafd1e60 r6:8521af00 r5:85388000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520dc00
INFO: task kworker/1:446:4528 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4530 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447   state:D stack:0     pid:4530  tgid:4530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:85389800
 r4:85389800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85389800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520d500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85389800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b8b8c r4:853b8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b8b8c r4:851f7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85389800 r8:851f7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7d00 r8:80287e08 r7:eafd1e60 r6:8521af80 r5:85389800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff1fb0 to 0xeaff1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520de80
INFO: task kworker/1:447:4530 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4532 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448   state:D stack:0     pid:4532  tgid:4532  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:8538b000
 r4:8538b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8538b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b938c r4:853b9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b938c r4:851f7d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538b000 r8:851f7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7d80 r8:80287e08 r7:eafd1e60 r6:8531e000 r5:8538b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff5fb0 to 0xeaff5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8520de80
INFO: task kworker/1:448:4532 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b7da2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:257:4534 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:257   state:D stack:0     pid:4534  tgid:4534  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8538bc00
 r4:8538bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8538bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b8f8c r4:853b8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853b8f8c r4:8531e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538bc00 r8:8531e0ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8531e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531e080 r8:80287e08 r7:eae71e60 r6:8531e100 r5:8538bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8531b240
INFO: task kworker/0:257:4534 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b87b1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:258:4535 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:258   state:D stack:0     pid:4535  tgid:4535  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:8538c800
 r4:8538c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8538c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e091b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f4f8c r4:853f4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f4f8c r4:8531e180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538c800 r8:8531e1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8531e180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531e180 r8:80287e08 r7:eae71e60 r6:8531e200 r5:8538c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe5fb0 to 0xeafe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8531b240
INFO: task kworker/0:258:4535 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b89c4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:259:4538 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:259   state:D stack:0     pid:4538  tgid:4538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:8538d400
 r4:8538d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8538d400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0520000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bbf8c r4:853bbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853bbf8c r4:8531e280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538d400 r8:8531e2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8531e280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531e280 r8:80287e08 r7:eafe5e60 r6:8531e300 r5:8538d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf9dfb0 to 0xeaf9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8531b440
INFO: task kworker/0:259:4538 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b8bdf000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:449:4541 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:449   state:D stack:0     pid:4541  tgid:4541  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:8538e000
 r4:8538e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8538e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b978c r4:853b9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b978c r4:851f7e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538e000 r8:851f7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7e00 r8:80287e08 r7:eafd1e60 r6:8531e380 r5:8538e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaffdfb0 to 0xeaffdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310180
INFO: task kworker/1:449:4541 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b8e24000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4542 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450   state:D stack:0     pid:4542  tgid:4542  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:8538ec00
 r4:8538ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853104c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8538ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853b9b8c r4:853b9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853b9b8c r4:851f7e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538ec00 r8:851f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7e80 r8:80287e08 r7:eafd1e60 r6:8531e400 r5:8538ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb001fb0 to 0xeb001ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310180
INFO: task kworker/1:450:4542 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b8f67000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:451:4545 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:451   state:D stack:0     pid:4545  tgid:4545  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:85390000
 r4:85390000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85390000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85390000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ba38c r4:853ba000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ba38c r4:851f7f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85390000 r8:851f7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7f00 r8:80287e08 r7:eafd1e60 r6:8531e480 r5:85390000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadadfb0 to 0xeadadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310400
INFO: task kworker/1:451:4545 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b91b7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:452:4548 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:452   state:D stack:0     pid:4548  tgid:4548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:85392400
 r4:85392400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85392400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853107c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85392400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ba78c r4:853ba400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ba78c r4:851f7f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85392400 r8:851f7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:851f7f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:851f7f80 r8:80287e08 r7:eadade60 r6:8531e500 r5:85392400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaee5fb0 to 0xeaee5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310480
INFO: task kworker/1:452:4548 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9309000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:453:4549 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:453   state:D stack:0     pid:4549  tgid:4549  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85393000
 r4:85393000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85393000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85393000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfdf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bab8c r4:853ba800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bab8c r4:8531a000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85393000 r8:8531a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a000 r8:80287e08 r7:eaee5e60 r6:8531e580 r5:85393000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaef1fb0 to 0xeaef1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310480
INFO: task kworker/1:453:4549 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9470000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:454:4552 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:454   state:D stack:0     pid:4552  tgid:4552  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:85391800
 r4:85391800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85391800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85391800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853baf8c r4:853bac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853baf8c r4:8531a080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85391800 r8:8531a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a080 r8:80287e08 r7:eaef1e60 r6:8531e600 r5:85391800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf11fb0 to 0xeaf11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310740
INFO: task kworker/1:454:4552 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9870000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:455:4553 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:455   state:D stack:0     pid:4553  tgid:4553  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf1dd84 r8:00000002 r7:60000113 r6:eaf1dd8c r5:85394800
 r4:85394800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85394800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85394800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bb38c r4:853bb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bb38c r4:8531a100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85394800 r8:8531a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a100 r8:80287e08 r7:eaf11e60 r6:8531e680 r5:85394800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf1dfb0 to 0xeaf1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310740
INFO: task kworker/1:455:4553 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9ab9000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:456:4555 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:456   state:D stack:0     pid:4555  tgid:4555  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:8535c800
 r4:8535c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8535c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e01a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bbb8c r4:853bb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bbb8c r4:8531a180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535c800 r8:8531a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a180 r8:80287e08 r7:eaf1de60 r6:8531a200 r5:8535c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaff9fb0 to 0xeaff9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310a80
INFO: task kworker/1:456:4555 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9d04000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:457:4557 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:457   state:D stack:0     pid:4557  tgid:4557  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:8535e000
 r4:8535e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85310cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8535e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0149000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853bb78c r4:853bb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853bb78c r4:8531a280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535e000 r8:8531a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a280 r8:80287e08 r7:eaff9e60 r6:8531a300 r5:8535e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb005fb0 to 0xeb005ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310a80
INFO: task kworker/1:457:4557 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   b9f50000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4559 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458   state:D stack:0     pid:4559  tgid:4559  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:8535ec00
 r4:8535ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8535ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c078c r4:853c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c078c r4:8531a380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535ec00 r8:8531a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a380 r8:80287e08 r7:eaff9e60 r6:8531a400 r5:8535ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf31fb0 to 0xeaf31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310d00
INFO: task kworker/1:458:4559 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ba22b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:459:4560 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:459   state:D stack:0     pid:4560  tgid:4560  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:8535d400
 r4:8535d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853252c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8535d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c0b8c r4:853c0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c0b8c r4:8531a480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535d400 r8:8531a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a480 r8:80287e08 r7:eaf31e60 r6:8531a500 r5:8535d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf45fb0 to 0xeaf45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85310d00
INFO: task kworker/1:459:4560 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ba67d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:260:4563 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:260   state:D stack:0     pid:4563  tgid:4563  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf71d84 r8:00000002 r7:60000013 r6:eaf71d8c r5:8535b000
 r4:8535b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531b740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8535b000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0893000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c038c r4:853c0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853c038c r4:8531e700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535b000 r8:8531e72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8531e700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531e700 r8:80287e08 r7:eafe5e60 r6:8531a580 r5:8535b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf71fb0 to 0xeaf71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8531b740
INFO: task kworker/0:260:4563 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ba67d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:261:4566 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:261   state:D stack:0     pid:4566  tgid:4566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:8535bc00
 r4:8535bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8535bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547dec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8535bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f438c r4:853f4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f438c r4:8531e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8535bc00 r8:8531e7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8531e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531e780 r8:80287e08 r7:eafe5e60 r6:8531a600 r5:8535bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf4dfb0 to 0xeaf4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8531be00
INFO: task kworker/0:261:4566 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   baab0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:460:4568 blocked for more than 453 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:460   state:D stack:0     pid:4568  tgid:4568  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000113 r6:eaf65d8c r5:85368000
 r4:85368000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85368000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85368000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaac1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c0f8c r4:853c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c0f8c r4:8531a680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85368000 r8:8531a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a680 r8:80287e08 r7:eaf45e60 r6:8531a700 r5:85368000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf65fb0 to 0xeaf65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85325140
INFO: task kworker/1:460:4568 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bacca000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:461:4570 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461   state:D stack:0     pid:4570  tgid:4570  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eaf59d84 r8:00000002 r7:60000013 r6:eaf59d8c r5:85368c00
 r4:85368c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85368c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85368c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaae9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c138c r4:853c1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
 r4:8530e480
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c178c r4:853c1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c178c r4:8531a880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85369800 r8:8531a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531a880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531a880 r8:80287e08 r7:eaf59e60 r6:8531a900 r5:85369800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf7dfb0 to 0xeaf7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85325380
INFO: task kworker/1:462:4572 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:00000001
      Not tainted 6.15.0-rc7-syzkaller #0
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r7:ddde2d80 r6:83018200 r5:853c278c r4:8531a980
Call trace: 
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
dfa0:                                     00000000 00000000 00000000 00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8536b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c1b8c r4:853c1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c1b8c r4:8531aa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8536b000 r8:8531aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531aa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531aa80 r8:80287e08 r7:eb00de60 r6:8531ab00 r5:8536b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb019fb0 to 0xeb019ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85325640
INFO: task kworker/1:464:4576 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bc3d4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:465:4577 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:465   state:D stack:0     pid:4577  tgid:4577  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:8536bc00
 r4:8536bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8536bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8536bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c1f8c r4:853c1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c1f8c r4:8531ab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8536bc00 r8:8531abac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531ab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531ab80 r8:80287e08 r7:eb00de60 r6:8531ac00 r5:8536bc00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeae7dd28 to 0xeae7dd70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4580 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466   state:D stack:0     pid:4580  tgid:4580  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb029d84 r8:00000002 r7:60000113 r6:eb029d8c r5:8536c800
 r4:8536c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8536c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325c40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8536c800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:853c238c r4:853c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c238c r4:8531ac80
 r10:61c88647 r9:8536c800 r8:8531acac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd20:                   bce59000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:467:4582 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:467   state:D stack:0     pid:4582  tgid:4582  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:8536d400
 r4:8536d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8536d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8536d400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c2b8c r4:853c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c2b8c r4:8531ad80
 r10:61c88647 r9:8536d400 r8:8531adac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:468:4584 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:468   state:D stack:0     pid:4584  tgid:4584  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:8536e000
 r4:8536e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8536e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531be00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8536e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c2f8c r4:853c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c2f8c r4:8531ae80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8536e000 r8:8531aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531ae80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531ae80 r8:80287e08 r7:eb035e60 r6:8531af00 r5:8536e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb039fb0 to 0xeb039ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85325d40
INFO: task kworker/1:468:4584 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bd5d3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:469:4587 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:469   state:D stack:0     pid:4587  tgid:4587  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:eb03dd84 r8:00000002 r7:60000113 r6:eb03dd8c r5:8536ec00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339040
 r5:853c338c r4:853c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c338c r4:8531af80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8536ec00 r8:8531afac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8531af80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8531af80 r8:80287e08 r7:eb039e60 r6:85337000 r5:8536ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb03dfb0 to 0xeb03dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339080
INFO: task kworker/1:469:4587 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bdd8b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r5:85370000 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85370000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaefd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c3b8c r4:853c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c3b8c r4:85337080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85370000 r8:853370ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337080 r8:80287e08 r7:eb03de60 r6:85337100 r5:85370000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb041fb0 to 0xeb041ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339140
INFO: task kworker/1:470:4588 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bdd8b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85371800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaebf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c378c r4:853c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c378c r4:85337180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85371800 r8:853371ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:472:4592 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:472   state:D stack:0     pid:4592  tgid:4592  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb049d84 r8:00000002 r7:60000013 r6:eb049d8c r5:85373000
 r4:85373000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85373000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85373000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853c3f8c r4:853c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853c3f8c r4:85337280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85373000 r8:853372ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337280 r8:80287e08 r7:eb041e60 r6:85337300 r5:85373000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb049fb0 to 0xeb049ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339400
INFO: task kworker/1:472:4592 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd20:                   be63c000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:473:4594 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:473   state:D stack:0     pid:4594  tgid:4594  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:85373c00
 r4:85373c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85373c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85373c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:853ccb8c r4:853cc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ccb8c r4:85337380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85373c00 r8:853373ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337380 r8:80287e08 r7:eb049e60 r6:85337480 r5:85373c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:474:4595 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:474   state:D stack:0     pid:4595  tgid:4595  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:85374800
 r4:85374800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85374800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85374800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf49000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cc38c r4:853cc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cc38c r4:85337400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85374800 r8:8533742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337400 r8:80287e08 r7:eb04de60 r6:85337500 r5:85374800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb051fb0 to 0xeb051ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339840
INFO: task kworker/1:474:4595 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   beab6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:475:4598 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:475   state:D stack:0     pid:4598  tgid:4598  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:85370c00
 r4:85370c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85370c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85370c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cc78c r4:853cc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cc78c r4:85337580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85370c00 r8:853375ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337580 r8:80287e08 r7:eb04de60 r6:85337600 r5:85370c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339a00
INFO: task kworker/1:475:4598 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bed57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4600 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476   state:D stack:0     pid:4600  tgid:4600  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:85375400
 r4:85375400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85375400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85375400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb05f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ccf8c r4:853ccc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ccf8c r4:85337680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85375400 r8:853376ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337680 r8:80287e08 r7:eb04de60 r6:85337700 r5:85375400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb055fb0 to 0xeb055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339b40
INFO: task kworker/1:476:4600 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bf12c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:477:4602 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:477   state:D stack:0     pid:4602  tgid:4602  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000013 r6:eb05dd8c r5:85376000
 r4:85376000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85376000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85376000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb083000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cd78c r4:853cd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cd78c r4:85337780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85376000 r8:853377ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337780 r8:80287e08 r7:eb055e60 r6:85337800 r5:85376000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb05dfb0 to 0xeb05dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339c40
INFO: task kworker/1:477:4602 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bf37f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:478:4603 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:478   state:D stack:0     pid:4603  tgid:4603  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb071d84 r8:00000002 r7:60000113 r6:eb071d8c r5:85376c00
 r4:85376c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85376c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85376c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb06b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cd38c r4:853cd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cd38c r4:85337880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85376c00 r8:853378ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337880 r8:80287e08 r7:eb05de60 r6:85337900 r5:85376c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb071fb0 to 0xeb071ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85339c40
INFO: task kworker/1:478:4603 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bf37f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:479:4606 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:479   state:D stack:0     pid:4606  tgid:4606  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:85372400
 r4:85372400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85372400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85372400 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df9d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cdb8c r4:853cd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cdb8c r4:85337980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85372400 r8:853379ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337980 r8:80287e08 r7:eb05de60 r6:85337a00 r5:85372400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb069fb0 to 0xeb069ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462000
INFO: task kworker/1:479:4606 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bf519000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:480:4608 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:480   state:D stack:0     pid:4608  tgid:4608  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:85428000
 r4:85428000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85428000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cdf8c r4:853cdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cdf8c r4:85337a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85428000 r8:85337aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337a80 r8:80287e08 r7:eb069e60 r6:85337b00 r5:85428000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462180
INFO: task kworker/1:480:4608 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bf950000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:481:4610 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:481   state:D stack:0     pid:4610  tgid:4610  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:85393c00
 r4:85393c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85393c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85393c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0567000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cf38c r4:853cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cf38c r4:85337b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85393c00 r8:85337bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337b80 r8:80287e08 r7:eb091e60 r6:8531e800 r5:85393c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462280
INFO: task kworker/1:481:4610 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bfc75000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:482:4612 blocked for more than 454 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:482   state:D stack:0     pid:4612  tgid:4612  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:85396000
 r4:85396000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85396000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854625c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85396000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfce5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ce38c r4:853ce000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ce38c r4:85337c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85396000 r8:85337c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337c00 r8:80287e08 r7:eb099e60 r6:8531e880 r5:85396000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b1fb0 to 0xeb0b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462440
INFO: task kworker/1:482:4612 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bfd98000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4613 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483   state:D stack:0     pid:4613  tgid:4613  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:85390c00
 r4:85390c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85390c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85390c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfed7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ce78c r4:853ce400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ce78c r4:85337c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85390c00 r8:85337cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337c80 r8:80287e08 r7:eb099e60 r6:8531e900 r5:85390c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b5fb0 to 0xeb0b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462440
INFO: task kworker/1:483:4613 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   bfee6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:484:4617 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:484   state:D stack:0     pid:4617  tgid:4617  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:85396c00
 r4:85396c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85396c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85396c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ceb8c r4:853ce800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ceb8c r4:85337d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85396c00 r8:85337d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337d00 r8:80287e08 r7:eb099e60 r6:8531e980 r5:85396c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462780
INFO: task kworker/1:484:4617 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c00e5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4618 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485   state:D stack:0     pid:4618  tgid:4618  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:85395400
 r4:85395400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85395400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85395400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e00d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cef8c r4:853cec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cef8c r4:85337d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85395400 r8:85337dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337d80 r8:80287e08 r7:eb099e60 r6:8531ea00 r5:85395400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b9fb0 to 0xeb0b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462540
INFO: task kworker/1:485:4618 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c04c3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:486:4622 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:486   state:D stack:0     pid:4622  tgid:4622  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:84a80c00
 r4:84a80c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a80c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462c80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0636000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cf78c r4:853cf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cf78c r4:85337e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a80c00 r8:85337e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337e00 r8:80287e08 r7:eb099e60 r6:8531ea80 r5:84a80c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e1fb0 to 0xeb0e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462980
INFO: task kworker/1:486:4622 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c0744000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:487:4623 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:487   state:D stack:0     pid:4623  tgid:4623  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:84a81800
 r4:84a81800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a81800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854740c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d478c r4:853d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d478c r4:85337e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a81800 r8:85337eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337e80 r8:80287e08 r7:eb0e1e60 r6:8531eb00 r5:84a81800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f1fb0 to 0xeb0f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462980
INFO: task kworker/1:487:4623 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c0958000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4625 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488   state:D stack:0     pid:4625  tgid:4625  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:84a80000
 r4:84a80000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a80000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0693000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cfb8c r4:853cf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cfb8c r4:85337f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a80000 r8:85337f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337f00 r8:80287e08 r7:eb0f1e60 r6:8531eb80 r5:84a80000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0f9fb0 to 0xeb0f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462c40
INFO: task kworker/1:488:4625 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c0c74000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4626 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489   state:D stack:0     pid:4626  tgid:4626  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:84a83000
 r4:84a83000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a83000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853cff8c r4:853cfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853cff8c r4:85337f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a83000 r8:85337fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85337f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85337f80 r8:80287e08 r7:eb0f1e60 r6:8531ec00 r5:84a83000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462c40
INFO: task kworker/1:489:4626 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c0ea6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:490:4628 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:490   state:D stack:0     pid:4628  tgid:4628  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:84a84800
 r4:84a84800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a84800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0785000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d438c r4:853d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d438c r4:85469000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a84800 r8:8546902c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469000 r8:80287e08 r7:eb0f1e60 r6:8531ec80 r5:84a84800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb115fb0 to 0xeb115ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85462d40
INFO: task kworker/1:490:4628 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c1626000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:491:4631 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:491   state:D stack:0     pid:4631  tgid:4631  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:84a83c00
 r4:84a83c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a83c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854746c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d578c r4:853d5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d578c r4:85469080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a83c00 r8:854690ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469080 r8:80287e08 r7:eb0f1e60 r6:8531ed00 r5:84a83c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb121fb0 to 0xeb121ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474000
INFO: task kworker/1:491:4631 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c1626000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:492:4632 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:492   state:D stack:0     pid:4632  tgid:4632  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:84a85400
 r4:84a85400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a85400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d4b8c r4:853d4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d4b8c r4:85469100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a85400 r8:8546912c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469100 r8:80287e08 r7:eb121e60 r6:8531ed80 r5:84a85400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb125fb0 to 0xeb125ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474000
INFO: task kworker/1:492:4632 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c1e3a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:493:4634 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:493   state:D stack:0     pid:4634  tgid:4634  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000013 r6:eb12dd8c r5:84a86000
 r4:84a86000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a86000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d4f8c r4:853d4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d4f8c r4:85469180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a86000 r8:854691ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469180 r8:80287e08 r7:eb121e60 r6:8531ee00 r5:84a86000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb12dfb0 to 0xeb12dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474240
INFO: task kworker/1:493:4634 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c2230000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:494:4636 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:494   state:D stack:0     pid:4636  tgid:4636  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:85429800
 r4:85429800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85429800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e8a01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d538c r4:853d5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d538c r4:85469200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85429800 r8:8546922c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469200 r8:80287e08 r7:eb121e60 r6:85469280 r5:85429800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb09dfb0 to 0xeb09dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474280
INFO: task kworker/1:494:4636 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c26ed000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:495:4639 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:495   state:D stack:0     pid:4639  tgid:4639  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:8542a400
 r4:8542a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d5b8c r4:853d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d5b8c r4:85469300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542a400 r8:8546932c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469300 r8:80287e08 r7:eb121e60 r6:85469380 r5:8542a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb131fb0 to 0xeb131ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474540
INFO: task kworker/1:495:4639 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c2ccc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:496:4640 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:496   state:D stack:0     pid:4640  tgid:4640  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:8542b000
 r4:8542b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d638c r4:853d6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d638c r4:85469400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542b000 r8:8546942c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469400 r8:80287e08 r7:eb131e60 r6:85469480 r5:8542b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb135fb0 to 0xeb135ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474780
INFO: task kworker/1:496:4640 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c2ccc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:497:4643 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:497   state:D stack:0     pid:4643  tgid:4643  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854749c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d5f8c r4:853d5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d5f8c r4:85469500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542c800 r8:8546952c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469500 r8:80287e08 r7:eb135e60 r6:85469580 r5:8542c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb13dfb0 to 0xeb13dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854747c0
INFO: task kworker/1:497:4643 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c3483000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4645 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498   state:D stack:0     pid:4645  tgid:4645  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:8542e000
 r4:8542e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d6b8c r4:853d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d6b8c r4:85469600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542e000 r8:8546962c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469600 r8:80287e08 r7:eb135e60 r6:85469680 r5:8542e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb079fb0 to 0xeb079ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854747c0
INFO: task kworker/1:498:4645 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c366d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4647 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499   state:D stack:0     pid:4647  tgid:4647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:8542bc00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:eaca9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d678c r4:853d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d678c r4:85469700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542bc00 r8:8546972c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469700 r8:80287e08 r7:eb079e60 r6:85469780 r5:8542bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474b40
INFO: task kworker/1:499:4647 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c3f07000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4650 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:500   state:D stack:0     pid:4650  tgid:4650  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:8542ec00
 r4:8542ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853309c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d778c r4:853d7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d778c r4:85469800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542ec00 r8:8546982c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469800 r8:80287e08 r7:eb079e60 r6:85469880 r5:8542ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb141fb0 to 0xeb141ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474d00
INFO: task kworker/1:500:4650 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c4399000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:501:4651 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:501   state:D stack:0     pid:4651  tgid:4651  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:8542d400
 r4:8542d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8542d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8542d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853d6f8c r4:853d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d6f8c r4:85469900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8542d400 r8:8546992c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469900 r8:80287e08 r7:eb141e60 r6:85469980 r5:8542d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb145fb0 to 0xeb145ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85474e40
INFO: task kworker/1:501:4651 is blocked on a mutex likely owned by task kworker/1:417:4402.
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08
 r5:853d738c r4:853d7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853d738c r4:85469a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85428c00 r8:85469a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469a00 r8:80287e08 r7:eb141e60 r6:85469a80 r5:85428c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb149fb0 to 0xeb149ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85330380
INFO: task kworker/1:502:4654 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c4ffd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:85cd538c r4:85cd5000
 r4:00000001
 r4:8530e480
 r10:8291a684 r9:eb14dd84 r8:00000002 r7:60000113 r6:eb14dd8c r5:85430000
 r4:00000000
 r5:853d7b8c r4:853d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
dd60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4657 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504   state:D stack:0     pid:4657  tgid:4657  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08
 r5:853dc38c r4:853dc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:ed8b3000
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:505:4658 blocked for more than 455 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:505   state:D stack:0     pid:4658  tgid:4658  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:85431800
 r4:85431800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:853d7f8c r4:853d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85431800 r8:85469d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469d00 r8:80287e08 r7:eb151e60 r6:85469d80 r5:85431800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb159fb0 to 0xeb159ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d040
INFO: task kworker/1:505:4658 is blocked on a mutex likely owned by task kworker/1:417:4402.
Exception stack(0xeae7dd28 to 0xeae7dd70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Call trace: 
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08
 r5:853dc78c r4:853dc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84a86c00 r8:85469e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469e00 r8:80287e08 r7:eb151e60 r6:8531ee80 r5:84a86c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb161fb0 to 0xeb161ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d300
INFO: task kworker/1:506:4661 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c5f91000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8530a300
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:853dcb8c r4:853dc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dcb8c r4:85469e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85469e80
Exception stack(0xeb165fb0 to 0xeb165ff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:8538a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8538a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dc00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8538a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853dd78c r4:853dd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dd78c r4:85469f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8538a400 r8:85469f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469f00 r8:80287e08 r7:eb165e60 r6:8531ef80 r5:8538a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb169fb0 to 0xeb169ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d680
INFO: task kworker/1:508:4664 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c65f2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
 r5:85cd538c r4:85cd5000
 r4:8530a300
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:8530e480
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:00001000 r4:e08a3000
 r5:853f4b8c r4:853f4800
 r7:dddced80 r6:83018000 r5:853f4b8c r4:85496000
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeae7dd28 to 0xeae7dd70)
 r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:85398000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85398000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548d740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85398000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853dcf8c r4:853dcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dcf8c r4:85469f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85398000 r8:85469fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85469f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85469f80 r8:80287e08 r7:eb169e60 r6:85496100 r5:85398000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb16dfb0 to 0xeb16dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d740
INFO: task kworker/1:509:4668 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c6be4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4671 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510   state:D stack:0     pid:4671  tgid:4671  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:8539a400
 r4:8539a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548da80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8539a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb173000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853dd38c r4:853dd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dd38c r4:85493000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8539a400 r8:8549302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493000 r8:80287e08 r7:eb169e60 r6:85496180 r5:8539a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb181fb0 to 0xeb181ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d940
INFO: task kworker/1:510:4671 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c6fb7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4672 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511   state:D stack:0     pid:4672  tgid:4672  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85398c00
 r4:85398c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85398c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dd80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85398c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfbc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ddb8c r4:853dd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ddb8c r4:85493080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85398c00 r8:854930ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493080 r8:80287e08 r7:eb169e60 r6:85496200 r5:85398c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb185fb0 to 0xeb185ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d940
INFO: task kworker/1:511:4672 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c76cb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4674 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512   state:D stack:0     pid:4674  tgid:4674  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:85399800
 r4:85399800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85399800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85399800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853df78c r4:853df400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853df78c r4:85493100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85399800 r8:8549312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493100 r8:80287e08 r7:eb185e60 r6:85496280 r5:85399800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548d980
INFO: task kworker/1:512:4674 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c7dff000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4676 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513   state:D stack:0     pid:4676  tgid:4676  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:8539b000
 r4:8539b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8539b000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfe83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853ddf8c r4:853ddc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853ddf8c r4:85493180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8539b000 r8:854931ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493180 r8:80287e08 r7:eb059e60 r6:85496300 r5:8539b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb089fb0 to 0xeb089ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548db80
INFO: task kworker/1:513:4676 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c81ea000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4679 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514   state:D stack:0     pid:4679  tgid:4679  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:8539bc00
 r4:8539bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548dfc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8539bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffe7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853de38c r4:853de000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853de38c r4:85493200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8539bc00 r8:8549322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493200 r8:80287e08 r7:eb059e60 r6:85496380 r5:8539bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb195fb0 to 0xeb195ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8548dd40
INFO: task kworker/1:514:4679 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c85fd000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4682 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515   state:D stack:0     pid:4682  tgid:4682  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:85432400
 r4:85432400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85432400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a6ff80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85432400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e01c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853de78c r4:853de400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853de78c r4:85493280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85432400 r8:854932ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493280 r8:80287e08 r7:eb059e60 r6:85493300 r5:85432400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb15dfb0 to 0xeb15dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a6f780
INFO: task kworker/1:515:4682 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c8975000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4683 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516   state:D stack:0     pid:4683  tgid:4683  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:85434800
 r4:85434800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85434800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e051c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853deb8c r4:853de800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853deb8c r4:85493380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85434800 r8:854933ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493380 r8:80287e08 r7:eb059e60 r6:85493400 r5:85434800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb199fb0 to 0xeb199ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8547da80
INFO: task kworker/1:516:4683 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c89da000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4686 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517   state:D stack:0     pid:4686  tgid:4686  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:85436000
 r4:85436000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85436000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85436000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaabf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853def8c r4:853dec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853def8c r4:85493480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85436000 r8:854934ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493480 r8:80287e08 r7:eb059e60 r6:85493500 r5:85436000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84a6f780
INFO: task kworker/1:517:4686 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c8df2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:263:4687 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:263   state:D stack:0     pid:4687  tgid:4687  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:85433c00
 r4:85433c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dab40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f678c r4:853f6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f678c r4:85496400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433c00 r8:8549642c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85496400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85496400 r8:80287e08 r7:eafe5e60 r6:85493580 r5:85433c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a1fb0 to 0xeb1a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a1580
INFO: task kworker/0:263:4687 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c905b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:264:4689 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:264   state:D stack:0     pid:4689  tgid:4689  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:85435400
 r4:85435400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85435400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaec7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f538c r4:853f5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f538c r4:85496480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85435400 r8:854964ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85496480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85496480 r8:80287e08 r7:eb1a1e60 r6:85493600 r5:85435400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a9fb0 to 0xeb1a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a1580
INFO: task kworker/0:264:4689 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c94b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4692 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518   state:D stack:0     pid:4692  tgid:4692  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1a5d84 r8:00000002 r7:60000013 r6:eb1a5d8c r5:85436c00
 r4:85436c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85436c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549e5c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853df38c r4:853df000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853df38c r4:85493680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85436c00 r8:854936ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493680 r8:80287e08 r7:eb059e60 r6:85493700 r5:85436c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a5fb0 to 0xeb1a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e440
INFO: task kworker/1:518:4692 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c94b2000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4694 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519   state:D stack:0     pid:4694  tgid:4694  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:85433000
 r4:85433000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85433000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ea40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853dff8c r4:853dfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dff8c r4:85493780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85433000 r8:854937ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493780 r8:80287e08 r7:eb059e60 r6:85493800 r5:85433000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb171fb0 to 0xeb171ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e540
INFO: task kworker/1:519:4694 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c9836000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:853dfb8c r4:853df800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853dfb8c r4:85493880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85438000 r8:854938ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493880 r8:80287e08 r7:eb171e60 r6:85493900 r5:85438000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1adfb0 to 0xeb1adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e800
INFO: task kworker/1:520:4695 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c9a57000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4698 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521   state:D stack:0     pid:4698  tgid:4698  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1b1d84 r8:00000002 r7:60000113 r6:eb1b1d8c r5:85438c00
 r4:85438c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85438c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ebc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e438c r4:853e4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e438c r4:85493980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85438c00 r8:854939ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493980 r8:80287e08 r7:eb171e60 r6:85493a00 r5:85438c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b1fb0 to 0xeb1b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e840
INFO: task kworker/1:521:4698 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c9bf3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4700 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522   state:D stack:0     pid:4700  tgid:4700  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:85439800
 r4:85439800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85439800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ed00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85439800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae59000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e478c r4:853e4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e478c r4:85493a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85439800 r8:85493aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493a80 r8:80287e08 r7:eb1b1e60 r6:85493b00 r5:85439800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b5fb0 to 0xeb1b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e9c0
INFO: task kworker/1:522:4700 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   c9ddc000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4702 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523   state:D stack:0     pid:4702  tgid:4702  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8543a400
 r4:8543a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ef40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543a400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e4b8c r4:853e4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e4b8c r4:85493b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543a400 r8:85493bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493b80 r8:80287e08 r7:eb1b5e60 r6:85493c00 r5:8543a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb191fb0 to 0xeb191ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549e9c0
INFO: task kworker/1:523:4702 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ca129000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4704 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524   state:D stack:0     pid:4704  tgid:4704  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:8543b000
 r4:8543b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaee1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e4f8c r4:853e4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e4f8c r4:85493c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543b000 r8:85493cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493c80 r8:80287e08 r7:eb191e60 r6:85493d00 r5:8543b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1b9fb0 to 0xeb1b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549edc0
INFO: task kworker/1:524:4704 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ca129000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4705 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525   state:D stack:0     pid:4705  tgid:4705  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1c5d84 r8:00000002 r7:60000113 r6:eb1c5d8c r5:8543c800
 r4:8543c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e538c r4:853e5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e538c r4:85493d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543c800 r8:85493dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493d80 r8:80287e08 r7:eb1b9e60 r6:85493e00 r5:8543c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8549ee40
INFO: task kworker/1:525:4705 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ca4f4000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4708 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526   state:D stack:0     pid:4708  tgid:4708  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:8543d400
 r4:8543d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e578c r4:853e5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e578c r4:85493e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543d400 r8:85493eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493e80 r8:80287e08 r7:eb1c5e60 r6:85493f00 r5:8543d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af1c0
INFO: task kworker/1:526:4708 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ca760000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:265:4710 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:265   state:D stack:0     pid:4710  tgid:4710  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:8539ec00
 r4:8539ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8539ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ee78c r4:854ee400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854ee78c r4:85496500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8539ec00 r8:8549652c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85496500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85496500 r8:80287e08 r7:eb1a1e60 r6:85496580 r5:8539ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c9fb0 to 0xeb1c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a1c40
INFO: task kworker/0:265:4710 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ca8f7000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4712 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527   state:D stack:0     pid:4712  tgid:4712  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:8543ec00
 r4:8543ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af5c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e5b8c r4:853e5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e5b8c r4:85493f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543ec00 r8:85493fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85493f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85493f80 r8:80287e08 r7:eb1bde60 r6:854ad000 r5:8543ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c1fb0 to 0xeb1c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af300
INFO: task kworker/1:527:4712 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cac8f000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4714 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:528   state:D stack:0     pid:4714  tgid:4714  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:8543bc00
 r4:8543bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854afc00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e678c r4:853e6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e678c r4:854ad080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543bc00 r8:854ad0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad080 r8:80287e08 r7:eb1c1e60 r6:854ad100 r5:8543bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d1fb0 to 0xeb1d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af440
INFO: task kworker/1:528:4714 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   caf22000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:529:4715 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:529   state:D stack:0     pid:4715  tgid:4715  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:85440000
 r4:85440000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85440000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb00f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e5f8c r4:853e5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e5f8c r4:854ad180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85440000 r8:854ad1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad180 r8:80287e08 r7:eb1d1e60 r6:854ad200 r5:85440000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d5fb0 to 0xeb1d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af440
INFO: task kworker/1:529:4715 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   caf22000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:530:4717 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:530   state:D stack:0     pid:4717  tgid:4717  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:85441800
 r4:85441800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85441800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854afa40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85441800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb06d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e638c r4:853e6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e638c r4:854ad280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85441800 r8:854ad2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad280 r8:80287e08 r7:eb1d1e60 r6:854ad300 r5:85441800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af840
INFO: task kworker/1:530:4717 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cb4a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:531:4720 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:531   state:D stack:0     pid:4720  tgid:4720  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:85443000
 r4:85443000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85443000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aff00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85443000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e6b8c r4:853e6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e6b8c r4:854ad380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85443000 r8:854ad3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad380 r8:80287e08 r7:eb1d1e60 r6:854ad400 r5:85443000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e9fb0 to 0xeb1e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854afa80
INFO: task kworker/1:531:4720 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4721 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532   state:D stack:0     pid:4721  tgid:4721  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:85444800
 r4:85444800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85444800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854af100
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e6f8c r4:853e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e6f8c r4:854ad480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85444800 r8:854ad4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad480 r8:80287e08 r7:eb1e9e60 r6:854ad500 r5:85444800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1f5fb0 to 0xeb1f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854afd80
INFO: task kworker/1:532:4721 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:533:4724 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:533   state:D stack:0     pid:4724  tgid:4724  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:85445400
 r4:85445400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85445400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85445400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb20f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e778c r4:853e7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e778c r4:854ad580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85445400 r8:854ad5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad580 r8:80287e08 r7:eb1f5e60 r6:854ad600 r5:85445400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb201fb0 to 0xeb201ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854affc0
INFO: task kworker/1:533:4724 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cb890000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4725 blocked for more than 456 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534   state:D stack:0     pid:4725  tgid:4725  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000013 r6:eb20dd8c r5:85443c00
 r4:85443c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85443c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85443c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb203000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e738c r4:853e7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e738c r4:854ad680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85443c00 r8:854ad6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad680 r8:80287e08 r7:eb201e60 r6:854ad700 r5:85443c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb20dfb0 to 0xeb20dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b3080
INFO: task kworker/1:534:4725 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cbe93000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:535:4728 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:535   state:D stack:0     pid:4728  tgid:4728  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000113 r6:eb1e5d8c r5:85442400
 r4:85442400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85442400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb217000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e7b8c r4:853e7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e7b8c r4:854ad780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85442400 r8:854ad7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad780 r8:80287e08 r7:eb201e60 r6:854ad800 r5:85442400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e5fb0 to 0xeb1e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b3280
INFO: task kworker/1:535:4728 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cbe93000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4730 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536   state:D stack:0     pid:4730  tgid:4730  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1cdd84 r8:00000002 r7:60000113 r6:eb1cdd8c r5:85446c00
 r4:85446c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85446c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb223000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853e7f8c r4:853e7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853e7f8c r4:854ad880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85446c00 r8:854ad8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad880 r8:80287e08 r7:eb1e5e60 r6:854ad900 r5:85446c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1cdfb0 to 0xeb1cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b3300
INFO: task kworker/1:536:4730 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cc1ec000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4732 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537   state:D stack:0     pid:4732  tgid:4732  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb221d84 r8:00000002 r7:60000013 r6:eb221d8c r5:85446000
 r4:85446000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85446000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85446000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb22f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854e838c r4:854e8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854e838c r4:854ad980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85446000 r8:854ad9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ad980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ad980 r8:80287e08 r7:eb1cde60 r6:854ada00 r5:85446000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb221fb0 to 0xeb221ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b3580
INFO: task kworker/1:537:4732 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cc463000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:538:4735 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:538   state:D stack:0     pid:4735  tgid:4735  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb22dd84 r8:00000002 r7:60000013 r6:eb22dd8c r5:85440c00
 r4:85440c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85440c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85440c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb25f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854e938c r4:854e9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854e938c r4:854ada80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85440c00 r8:854adaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854ada80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ada80 r8:80287e08 r7:eb221e60 r6:854adb00 r5:85440c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb22dfb0 to 0xeb22dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b36c0
INFO: task kworker/1:538:4735 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cc87b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
INFO: task kworker/1:539:4736 blocked for more than 457 seconds.
 r10:8291a684 r9:eb245d84 r8:00000002 r7:60000013 r6:eb245d8c r5:85448000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08
 r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
 r5:854e878c r4:854e8400
 r7:ddde2d80 r6:83018200 r5:854e878c r4:854adb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:854b36c0
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cc87b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4738 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:540   state:D stack:0     pid:4738  tgid:4738  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:85448c00
 r4:85448c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85448c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3b00
 r5:854e8b8c r4:854e8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854e8b8c r4:854adc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:854adc80
Exception stack(0xeb239fb0 to 0xeb239ff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070113 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:541   state:D stack:0     pid:4740  tgid:4740  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:854e8f8c r4:854e8c00
 r7:ddde2d80 r6:83018200 r5:854e8f8c r4:854add80
 r4:854add80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854add80 r8:80287e08 r7:eb22de60 r6:854ade00 r5:85449800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb251fb0 to 0xeb251ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854b3a80
INFO: task kworker/1:541:4740 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cd22b000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4742 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542   state:D stack:0     pid:4742  tgid:4742  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:8544a400
 r4:8544a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb26b000
 r5:854e978c r4:854e9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854e978c r4:854ade80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:854ade80
Exception stack(0xeb25dfb0 to 0xeb25dff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070113 r4:80239bb0
 r4:eae7ddc0
 r5:00001000 r4:ed8b3000
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:8539e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
 r5:854e9b8c r4:854e9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8539e000 r8:854adfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb281fb0 to 0xeb281ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854af7c0
INFO: task kworker/1:543:4744 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cd627000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:544:4746 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:544   state:D stack:0     pid:4746  tgid:4746  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:8539d400
 r4:8539d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c60c0
 r4:00000000
 r9:83018205 r8:8539d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
 r5:854ea38c r4:854ea000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ea38c r4:854c4000
 r4:854c4000
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
 r4:00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:545:4748 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:545   state:D stack:0     pid:4748  tgid:4748  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:8543e000
 r4:8543e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8543e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb287000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854e9f8c r4:854e9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854e9f8c r4:854c4080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8543e000 r8:854c40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4080 r8:80287e08 r7:eb285e60 r6:85496700 r5:8543e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb295fb0 to 0xeb295ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8547da40
INFO: task kworker/1:545:4748 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cdbb0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eb2a3000
 r5:854ea78c r4:854ea400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ea78c r4:854c4100
 r4:854c4100
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ce0ae000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:547:4752 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547   state:D stack:0     pid:4752  tgid:4752  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:84b60000
 r4:84b60000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b60000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
 r5:00001000 r4:eb2b7000
 r5:854eab8c r4:854ea800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854eab8c r4:854c4180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b60000 r8:854c41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4180 r8:80287e08 r7:eb2b1e60 r6:85496800 r5:84b60000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b5fb0 to 0xeb2b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6240
INFO: task kworker/1:547:4752 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ce634000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:548:4754 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:548   state:D stack:0     pid:4754  tgid:4754  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:84b62400
 r4:84b62400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b62400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c65c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854eaf8c r4:854eac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854eaf8c r4:854c4200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b62400 r8:854c422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4200 r8:80287e08 r7:eb2b5e60 r6:85496880 r5:84b62400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c1fb0 to 0xeb2c1ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:82ac21e4
 r4:eae7ddc0
 r5:00001000 r4:ed8b3000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08
 r9:83018205 r8:84b63000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
 r5:854eb38c r4:854eb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:854c4280
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:550:4758 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:550   state:D stack:0     pid:4758  tgid:4758  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:84b64800
 r4:84b64800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b64800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:854eb78c r4:854eb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854eb78c r4:854c4300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
Exception stack(0xeae7dfb0 to 0xeae7dff8)
      Not tainted 6.15.0-rc7-syzkaller #0
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6940
 r5:854ebb8c r4:854eb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:854c4380
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:552:4762 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:552   state:D stack:0     pid:4762  tgid:4762  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb179d84 r8:00000002 r7:60000013 r6:eb179d8c r5:84b66c00
 r4:84b66c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b66c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ec38c r4:854ec000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ec38c r4:854c4400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b66c00 r8:854c442c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4400 r8:80287e08 r7:eb111e60 r6:85496a80 r5:84b66c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb179fb0 to 0xeb179ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6740
INFO: task kworker/1:552:4762 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cee4a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4763 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553   state:D stack:0     pid:4763  tgid:4763  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:84b65400
 r4:84b65400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b65400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6ac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ebf8c r4:854ebc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ebf8c r4:854c4480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b65400 r8:854c44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4480 r8:80287e08 r7:eb179e60 r6:85496b00 r5:84b65400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d1fb0 to 0xeb2d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6740
INFO: task kworker/1:553:4763 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cf07c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:554:4765 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:554   state:D stack:0     pid:4765  tgid:4765  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:84b63c00
 r4:84b63c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b63c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0563000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ec78c r4:854ec400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ec78c r4:854c4500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b63c00 r8:854c452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4500 r8:80287e08 r7:eb179e60 r6:85496b80 r5:84b63c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2d9fb0 to 0xeb2d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c68c0
INFO: task kworker/1:554:4765 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cf2d6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:555:4769 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:555   state:D stack:0     pid:4769  tgid:4769  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb269d84 r8:00000002 r7:60000113 r6:eb269d8c r5:84b60c00
 r4:84b60c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b60c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0640000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ecb8c r4:854ec800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ecb8c r4:854c4580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b60c00 r8:854c45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4580 r8:80287e08 r7:eb2d9e60 r6:85496c00 r5:84b60c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb269fb0 to 0xeb269ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6a80
INFO: task kworker/1:555:4769 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cf537000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:556:4772 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556   state:D stack:0     pid:4772  tgid:4772  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:8539c800
 r4:8539c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8539c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c63c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8539c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ecf8c r4:854ecc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ecf8c r4:854c4600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8539c800 r8:854c462c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4600 r8:80287e08 r7:eb269e60 r6:85496c80 r5:8539c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2ddfb0 to 0xeb2ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6bc0
INFO: task kworker/1:556:4772 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cf9a3000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:557:4773 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:557   state:D stack:0     pid:4773  tgid:4773  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:84a98000
 r4:84a98000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a98000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a98000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ed38c r4:854ed000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ed38c r4:854c4680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a98000 r8:854c46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4680 r8:80287e08 r7:eb2dde60 r6:85496d00 r5:84a98000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e1fb0 to 0xeb2e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c6bc0
INFO: task kworker/1:557:4773 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cfe95000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:558:4775 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:558   state:D stack:0     pid:4775  tgid:4775  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:84a98c00
 r4:84a98c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a98c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ed78c r4:854ed400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ed78c r4:854c4700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a98c00 r8:854c472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4700 r8:80287e08 r7:eb2e1e60 r6:85496d80 r5:84a98c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e5fb0 to 0xeb2e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854cc100
INFO: task kworker/1:558:4775 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   cfe95000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:559   state:D stack:0     pid:4777  tgid:4777  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:84a9a400
 r4:84a9a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a9a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc4c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:854edb8c r4:854ed800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854edb8c r4:854c4780
 r10:61c88647 r9:84a9a400 r8:854c47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d014d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:560:4779 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:560   state:D stack:0     pid:4779  tgid:4779  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:84a9bc00
 r4:84a9bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a9bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae37000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f638c r4:853f6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f638c r4:854c4800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a9bc00 r8:854c482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4800 r8:80287e08 r7:eb2ede60 r6:85496e80 r5:84a9bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2f5fb0 to 0xeb2f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20:                   d08c0000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r4:00000000
 r5:85cd538c r4:85cd5000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4780 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561   state:D stack:0     pid:4780  tgid:4780  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:84a9c800
 r4:84a9c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a9c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
 r5:854edf8c r4:854edc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854edf8c r4:854c4880
 r10:61c88647 r9:84a9c800 r8:854c48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
      Not tainted 6.15.0-rc7-syzkaller #0
 r10:8291a684 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:84a9b000
 r4:84a9b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a9b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ee38c r4:854ee000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ee38c r4:854c4900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a9b000 r8:854c492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4900 r8:80287e08 r7:eb2f5e60 r6:85496f80 r5:84a9b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc7-syzkaller #0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:854eeb8c r4:854ee800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:8291a684 r9:eb311d84 r8:00000002 r7:60000013 r6:eb311d8c r5:84a9e000
 r5:00001000 r4:eacb5000
 r5:854eef8c r4:854eec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854eef8c r4:854c4a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a9e000 r8:854c4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4a00 r8:80287e08 r7:eb2f5e60 r6:854dd080 r5:84a9e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb311fb0 to 0xeb311ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854cca80
INFO: task kworker/1:564:4787 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d1185000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r4:82ac21e4
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
 r4:00000001
INFO: task kworker/0:266:4788 blocked for more than 457 seconds.
 r4:00000000
 r9:83018005 r8:84a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
 r5:853f5b8c r4:853f5800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854da3c0
INFO: task kworker/0:266:4788 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d1185000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
 r4:8530a300
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:853f5f8c r4:853f5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f5f8c r4:854dd200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:565:4793 blocked for more than 457 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:565   state:D stack:0     pid:4793  tgid:4793  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:8544bc00
 r4:8544bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dad00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f6b8c r4:853f6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:853f6b8c r4:854c4a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544bc00 r8:854c4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4a80 r8:80287e08 r7:eb2f5e60 r6:854dd300 r5:8544bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb305fb0 to 0xeb305ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854cc9c0
Workqueue: events bpf_prog_free_deferred
dd20:                   d1a48000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:566:4795 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:566   state:D stack:0     pid:4795  tgid:4795  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb319d84 r8:00000002 r7:60000113 r6:eb319d8c r5:8544d400
 r4:8544d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cc900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854ef38c r4:854ef000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854ef38c r4:854c4b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544d400 r8:854c4b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4b00 r8:80287e08 r7:eb305e60 r6:854dd380 r5:8544d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb319fb0 to 0xeb319ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854cc880
INFO: task kworker/1:566:4795 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d1c12000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r5:00001000 r4:ed8b3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r5:8544ec00 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dae00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8544ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafdb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f6f8c r4:853f6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f6f8c r4:854dd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544ec00 r8:854dd42c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854dd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854dd400 r8:80287e08 r7:eb1a1e60 r6:854dd480 r5:8544ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb275fb0 to 0xeb275ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854da9c0
INFO: task kworker/0:268:4796 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d1c58000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:567:4799 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:567   state:D stack:0     pid:4799  tgid:4799  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:85528000
 r4:85528000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85528000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85528000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb175000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854eff8c r4:854efc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854eff8c r4:854c4b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85528000 r8:854c4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4b80 r8:80287e08 r7:eb319e60 r6:854c4c00 r5:85528000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb321fb0 to 0xeb321ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ccc00
INFO: task kworker/1:567:4799 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d1e4a000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
 r4:8530a300
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:269   state:D stack:0     pid:4800  tgid:4800  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:8544e000
 r4:8544e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8544e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab33000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f7f8c r4:853f7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:853f7f8c r4:854dd500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544e000 r8:854dd52c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854dd500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854dd500 r8:80287e08 r7:eb275e60 r6:854dd580 r5:8544e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb31dfb0 to 0xeb31dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20:                   d2281000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:4802 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270   state:D stack:0     pid:4802  tgid:4802  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854da300
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f738c r4:853f7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb329fb0 to 0xeb329ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854dac00
INFO: task kworker/0:270:4802 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d24d8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:271:4804 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854efb8c r4:854ef800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854efb8c r4:854dd700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8544b000 r8:854dd72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854dd700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854dd700 r8:80287e08 r7:eb31de60 r6:854dd780 r5:8544b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb325fb0 to 0xeb325ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854daf00
INFO: task kworker/0:271:4804 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d26cf000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:ed8b3000
dfa0:                                     00000000 00000000 00000000 00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:854c4c80
Workqueue: events bpf_prog_free_deferred
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
dfa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:569   state:D stack:0     pid:4808  tgid:4808  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:84ac9800
 r4:84ac9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ac9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb345000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f038c r4:854f0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f038c r4:854c4d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ac9800 r8:854c4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4d00 r8:80287e08 r7:eb321e60 r6:854dd880 r5:84ac9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb33dfb0 to 0xeb33dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c9400
INFO: task kworker/1:569:4808 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d29c1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:4809 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272   state:D stack:0     pid:4809  tgid:4809  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:84aca400
 r4:84aca400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84aca400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:853f7b8c r4:853f7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:854dd900 r8:80287e08 r7:eb31de60 r6:854dd980 r5:84aca400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d3200
INFO: task kworker/0:272:4809 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d30d0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4813 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb365000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f0b8c r4:854f0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f0b8c r4:854c4d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84acb000 r8:854c4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4d80 r8:80287e08 r7:eb33de60 r6:854dda00 r5:84acb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb35dfb0 to 0xeb35dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c9440
INFO: task kworker/1:570:4813 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d36a8000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c6bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb351000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f078c r4:854f0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f078c r4:854c4e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84acc800 r8:854c4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4e00 r8:80287e08 r7:eb35de60 r6:854dda80 r5:84acc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb361fb0 to 0xeb361ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c9440
INFO: task kworker/1:571:4814 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d396e000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4816 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572   state:D stack:0     pid:4816  tgid:4816  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:84acbc00
 r4:84acbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84acbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f0f8c r4:854f0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f0f8c r4:854c4e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84acbc00 r8:854c4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4e80 r8:80287e08 r7:eb35de60 r6:854ddb00 r5:84acbc00
Exception stack(0xeb36dfb0 to 0xeb36dff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r4:00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:573:4818 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:573   state:D stack:0     pid:4818  tgid:4818  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb385d84 r8:00000002 r7:60000013 r6:eb385d8c r5:84acd400
 r4:84acd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84acd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0600
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f178c r4:854f1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f178c r4:854c4f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:854c4f00 r8:80287e08 r7:eb36de60 r6:854ddb80 r5:84acd400
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
dd60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:574:4820 blocked for more than 458 seconds.
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d04c0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f138c r4:854f1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f138c r4:854c4f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84acec00 r8:854c4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854c4f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854c4f80 r8:80287e08 r7:eb385e60 r6:854ddc00 r5:84acec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb065fb0 to 0xeb065ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0080
INFO: task kworker/1:574:4820 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d3dd0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:575:4824 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:575   state:D stack:0     pid:4824  tgid:4824  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb379d84 r8:00000002 r7:60000013 r6:eb379d8c r5:8552bc00
 r4:8552bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e01af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f1b8c r4:854f1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f1b8c r4:854d2000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552bc00 r8:854d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2000 r8:80287e08 r7:eb385e60 r6:854d2080 r5:8552bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb379fb0 to 0xeb379ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0480
INFO: task kworker/1:575:4824 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d3dd0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:576:4826 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:576   state:D stack:0     pid:4826  tgid:4826  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000013 r6:eb1e1d8c r5:8552c800
 r4:8552c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0533000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f1f8c r4:854f1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f1f8c r4:854d2100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552c800 r8:854d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2100 r8:80287e08 r7:eb379e60 r6:854d2180 r5:8552c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1e1fb0 to 0xeb1e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0580
INFO: task kworker/1:576:4826 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:577:4828 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:577   state:D stack:0     pid:4828  tgid:4828  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:8552a400
 r4:8552a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0ac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f238c r4:854f2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f238c r4:854d2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552a400 r8:854d222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2200 r8:80287e08 r7:eb1e1e60 r6:854d2280 r5:8552a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb331fb0 to 0xeb331ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d02c0
INFO: task kworker/1:577:4828 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:578:4830 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:578   state:D stack:0     pid:4830  tgid:4830  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000013 r6:eb1fdd8c r5:8552d400
 r4:8552d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0d40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f278c r4:854f2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f278c r4:854d2300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552d400 r8:854d232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2300 r8:80287e08 r7:eb331e60 r6:854d2380 r5:8552d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1fdfb0 to 0xeb1fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0940
INFO: task kworker/1:578:4830 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4493000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:579:4832 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:579   state:D stack:0     pid:4832  tgid:4832  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb209d84 r8:00000002 r7:60000113 r6:eb209d8c r5:8552ec00
 r4:8552ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c9340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f2b8c r4:854f2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f2b8c r4:854d2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552ec00 r8:854d242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2400 r8:80287e08 r7:eb1fde60 r6:854d2480 r5:8552ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb209fb0 to 0xeb209ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0bc0
INFO: task kworker/1:579:4832 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r5:80070113 r4:80239bb0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8530a300
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r5:84ace000 r4:8291a680
 r5:00001000 r4:eaf41000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d3b40
INFO: task kworker/0:273:4835 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4b33000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6838c r4:84b68000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84ac8c00 r8:854dddac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d3b40
INFO: task kworker/0:274:4836 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4e44000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:580:4838 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:580   state:D stack:0     pid:4838  tgid:4838  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb235d84 r8:00000002 r7:60000013 r6:eb235d8c r5:85450000
 r4:85450000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85450000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f8b8c r4:854f8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f8b8c r4:854d2500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85450000 r8:854d252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2500 r8:80287e08 r7:eb209e60 r6:854dde80 r5:85450000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb235fb0 to 0xeb235ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0f80
INFO: task kworker/1:580:4838 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d4e44000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:581:4839 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:581   state:D stack:0     pid:4839  tgid:4839  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:85450c00
 r4:85450c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85450c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead91000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f2f8c r4:854f2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f2f8c r4:854d2580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85450c00 r8:854d25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2580 r8:80287e08 r7:eb235e60 r6:854ddf00 r5:85450c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb241fb0 to 0xeb241ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5000
INFO: task kworker/1:581:4839 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xeae7dd28 to 0xeae7dd70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85451800
 r5:85451800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85451800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f378c r4:854f3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f378c r4:854d2680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85451800 r8:854d26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2680 r8:80287e08 r7:eb235e60 r6:854ddf80 r5:85451800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb265fb0 to 0xeb265ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c53c0
INFO: task kworker/1:582:4842 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5356000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:583:4843 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:583   state:D stack:0     pid:4843  tgid:4843  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:85452400
 r4:85452400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85452400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85452400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaec1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f3b8c r4:854f3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f3b8c r4:854d2700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85452400 r8:854d272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2700 r8:80287e08 r7:eb235e60 r6:854d7000 r5:85452400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5280
INFO: task kworker/1:583:4843 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:584:4845 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:584   state:D stack:0     pid:4845  tgid:4845  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:85529800
 r4:85529800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85529800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85529800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f3f8c r4:854f3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f3f8c r4:854d2780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85529800 r8:854d27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2780 r8:80287e08 r7:eb235e60 r6:854d2800 r5:85529800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb229fb0 to 0xeb229ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5280
INFO: task kworker/1:584:4845 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:585:4848 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:585   state:D stack:0     pid:4848  tgid:4848  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb28dd84 r8:00000002 r7:60000113 r6:eb28dd8c r5:8552e000
 r4:8552e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8552e000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f838c r4:854f8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f838c r4:854d2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552e000 r8:854d28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2880 r8:80287e08 r7:eb235e60 r6:854d2900 r5:8552e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb28dfb0 to 0xeb28dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5280
INFO: task kworker/1:585:4848 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5779000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:275:4849 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:275   state:D stack:0     pid:4849  tgid:4849  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:85458000
 r4:85458000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85458000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5c80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb061000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f878c r4:854f8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:854f878c r4:854d7080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85458000 r8:854d70ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7080 r8:80287e08 r7:eb32de60 r6:854d2980 r5:85458000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a1fb0 to 0xeb2a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5100
INFO: task kworker/0:275:4849 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5fb5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:276:4851 blocked for more than 458 seconds.
Workqueue: events bpf_prog_free_deferred
 r10:8291a684 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:85458c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
 r5:00001000 r4:eb3e7000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541878c r4:85418400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541878c r4:854d7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85458c00 r8:854d712c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7100 r8:80287e08 r7:eb2a1e60 r6:854d2a00 r5:85458c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a9fb0 to 0xeb2a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5100
INFO: task kworker/0:276:4851 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d5fb5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:586:4853 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:586   state:D stack:0     pid:4853  tgid:4853  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2bdd84 r8:00000002 r7:60000113 r6:eb2bdd8c r5:8545a400
 r4:8545a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c53c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f8f8c r4:854f8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f8f8c r4:854d2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545a400 r8:854d2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2a80 r8:80287e08 r7:eb235e60 r6:854d2b00 r5:8545a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2bdfb0 to 0xeb2bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5bc0
INFO: task kworker/1:586:4853 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d62b5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:277:4854 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:277   state:D stack:0     pid:4854  tgid:4854  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:8545b000
 r4:8545b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8545b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541838c r4:85418000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541838c r4:854d7180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545b000 r8:854d71ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7180 r8:80287e08 r7:eb2a9e60 r6:854d2b80 r5:8545b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c9fb0 to 0xeb2c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5100
INFO: task kworker/0:277:4854 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d64e1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:587:4858 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:587   state:D stack:0     pid:4858  tgid:4858  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:8545c800
 r4:8545c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d0a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb211000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f938c r4:854f9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f938c r4:854d2c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545c800 r8:854d2c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2c00 r8:80287e08 r7:eb2bde60 r6:854d2c80 r5:8545c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb271fb0 to 0xeb271ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c5f40
INFO: task kworker/1:587:4858 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d6759000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:588:4859 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:588   state:D stack:0     pid:4859  tgid:4859  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:8545d400
 r4:8545d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb255000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f9b8c r4:854f9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f9b8c r4:854d2d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545d400 r8:854d2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2d00 r8:80287e08 r7:eb271e60 r6:854d2d80 r5:8545d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3a1fb0 to 0xeb3a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d0e00
INFO: task kworker/1:588:4859 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d69ea000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:589:4861 blocked for more than 458 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:589   state:D stack:0     pid:4861  tgid:4861  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:85455400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
 r5:00001000 r4:eb225000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0:                                     00000000 00000000 00000000 00000000
Call trace: 
dd20:                   d6ced000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530e480
Workqueue: events bpf_prog_free_deferred
 r5:85454800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c03c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85454800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb289000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854f9f8c r4:854f9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854f9f8c r4:854d2e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85454800 r8:854d2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2e80 r8:80287e08 r7:eb3a1e60 r6:854d7280 r5:85454800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b9fb0 to 0xeb3b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c0100
INFO: task kworker/1:590:4865 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d6dfb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:591:4866 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:591   state:D stack:0     pid:4866  tgid:4866  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000013 r6:eb3bdd8c r5:85456000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb2a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:854fa38c r4:854d2f00
Exception stack(0xeb3bdfb0 to 0xeb3bdff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:80070113 r4:80239bb0
 r4:eae7ddc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000013 r6:eb3c1d8c r5:85456c00
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb3a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854fa78c r4:854fa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854fa78c r4:854d2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85456c00 r8:854d2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854d2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d2f80 r8:80287e08 r7:eb3bde60 r6:854d7380 r5:85456c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c1fb0 to 0xeb3c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c0440
INFO: task kworker/1:592:4868 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d7705000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:593:4870 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:593   state:D stack:0     pid:4870  tgid:4870  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000013 r6:eb3c9d8c r5:85453c00
 r4:85453c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85453c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb3cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:84772b8c r4:8551c000
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:00000000
 r5:80070113 r4:80239bb0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:85cd538c r4:85cd5000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:594:4872 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:594   state:D stack:0     pid:4872  tgid:4872  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3b5d84 r8:00000002 r7:60000113 r6:eb3b5d8c r5:8545e000
 r4:8545e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb42d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854fbb8c r4:854fb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854fbb8c r4:8551c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545e000 r8:8551c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c080 r8:80287e08 r7:eb3c9e60 r6:8551c100 r5:8545e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b5fb0 to 0xeb3b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c0440
INFO: task kworker/1:594:4872 is blocked on a mutex likely owned by task kworker/1:417:4402.
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb3db000
 r5:854fab8c r4:854fa800
 r4:8551c180
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dd20:                   d83a0000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r5:00001000 r4:ed8b3000
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:278:4876 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:278   state:D stack:0     pid:4876  tgid:4876  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:8552b000
 r4:8552b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8552b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8552b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85418b8c r4:85418800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85418b8c r4:854d7480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8552b000 r8:854d74ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7480 r8:80287e08 r7:eb2a9e60 r6:8551c280 r5:8552b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3f5fb0 to 0xeb3f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5ac0
INFO: task kworker/0:278:4876 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d87ef000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:596:4878 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:596   state:D stack:0     pid:4878  tgid:4878  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000013 r6:eb3f9d8c r5:85528c00
 r4:85528c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85528c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08
 r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018205 r8:85528c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
 r5:00001000 r4:eb40f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854faf8c r4:854fac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854faf8c r4:8551c300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb3f9fb0 to 0xeb3f9ff8)
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:279:4880 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:279   state:D stack:0     pid:4880  tgid:4880  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb409d84 r8:00000002 r7:60000113 r6:eb409d8c r5:85590000
 r4:85590000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85590000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85590000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb483000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541938c r4:85419000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541938c r4:854d7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:854d7500 r8:80287e08 r7:eb3f5e60 r6:8551c400 r5:85590000
 r4:854d5c40
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r4:82ac21e4
 r5:00001000 r4:ed8b3000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:280:4881 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:280   state:D stack:0     pid:4881  tgid:4881  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:85590c00
 r4:85590c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85590c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f240
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85590c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb47b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85418f8c r4:85418c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85418f8c r4:854d7580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85590c00 r8:854d75ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r4:eae7ddc0
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85593000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb417000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:85593000 r8:8551c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xeae7dd28 to 0xeae7dd70)
 r4:82ac21e4
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
 r4:8530a300
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:598:4885 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:598   state:D stack:0     pid:4885  tgid:4885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85453000
 r4:85453000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85453000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c5780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85453000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb423000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854fb78c r4:854fb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854fb78c r4:8551c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85453000 r8:8551c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c580 r8:80287e08 r7:eb3b5e60 r6:854d7680 r5:85453000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b1fb0 to 0xeb3b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c0c00
INFO: task kworker/1:598:4885 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d9a98000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:599:4888 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:599   state:D stack:0     pid:4888  tgid:4888  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:84701800
 r4:84701800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84701800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7240
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84701800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb435000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:854fbf8c r4:854fbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:854fbf8c r4:8551c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84701800 r8:8551c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c600 r8:80287e08 r7:eb3b5e60 r6:854d7700 r5:84701800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb43dfb0 to 0xeb43dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d9b73000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:600   state:D stack:0     pid:4890  tgid:4890  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08
 r9:83018205 r8:84700c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
 r5:00001000 r4:e00b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550538c r4:85505000
 r7:ddde2d80 r6:83018200 r5:8550538c r4:8551c680
 r4:8551c680
Exception stack(0xeb44dfb0 to 0xeb44dff8)
 r4:854c7180
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   d9ee5000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:601:4892 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:601   state:D stack:0     pid:4892  tgid:4892  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:84703000
 r4:84703000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84703000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550438c r4:85504000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550438c r4:8551c700
 r10:61c88647 r9:84703000 r8:8551c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7380
INFO: task kworker/1:601:4892 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   da064000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:602:4894 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:602   state:D stack:0     pid:4894  tgid:4894  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:84702400
 r4:84702400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84702400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84702400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb455000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550478c r4:85504400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550478c r4:8551c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84702400 r8:8551c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
dd20:                   da46d000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r4:eae7ddc0
 r5:00001000 r4:ed8b3000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:603   state:D stack:0     pid:4895  tgid:4895  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:85504b8c r4:8551c800
 r10:00000000 r9:8551c800 r8:80287e08 r7:eb44de60 r6:854d7900 r5:84700000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:281:4898 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281   state:D stack:0     pid:4898  tgid:4898  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:84704800
 r4:84704800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84704800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f4c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84704800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb48b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541978c r4:85419400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541978c r4:854d7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84704800 r8:854d79ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7980 r8:80287e08 r7:eb409e60 r6:854d7a00 r5:84704800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb405fb0 to 0xeb405ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8551f140
INFO: task kworker/0:281:4898 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   da720000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:4900 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282   state:D stack:0     pid:4900  tgid:4900  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:84705400
 r4:84705400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84705400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84705400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85419f8c r4:85419c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85419f8c r4:854d7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84705400 r8:854d7aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7a80 r8:80287e08 r7:eb405e60 r6:854d7b00 r5:84705400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e5fb0 to 0xeb3e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8551f2c0
INFO: task kworker/0:282:4900 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dabc1000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:283:4902 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:283   state:D stack:0     pid:4902  tgid:4902  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:84706000
 r4:84706000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84706000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551f980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84706000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541a38c r4:8541a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541a38c r4:854d7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84706000 r8:854d7bac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7b80 r8:80287e08 r7:eb3e5e60 r6:854d7c00 r5:84706000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb469fb0 to 0xeb469ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8551f2c0
INFO: task kworker/0:283:4902 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dadae000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:604:4903 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:604   state:D stack:0     pid:4903  tgid:4903  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84706c00
 r4:84706c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84706c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84706c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85504f8c r4:85504c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85504f8c r4:8551c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84706c00 r8:8551c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c880 r8:80287e08 r7:eb44de60 r6:854d7c80 r5:84706c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb349fb0 to 0xeb349ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7600
INFO: task kworker/1:604:4903 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   db502000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:284   state:D stack:0     pid:4906  tgid:4906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:84703c00
 r4:84703c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84703c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb575000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541af8c r4:8541ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541af8c r4:854d7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84703c00 r8:854d7d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854d7d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854d7d00 r8:80287e08 r7:eb469e60 r6:854d7d80 r5:84703c00
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
dd20:                   db7ef000 df9c1000 00000001 80239b98 7f3cb000 00000001
 r4:eae7ddc0
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:285:4907 blocked for more than 459 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:285   state:D stack:0     pid:4907  tgid:4907  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:84a20000
 r4:84a20000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a20000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541a78c r4:8541a400
 r7:dddced80 r6:83018000 r5:8541a78c r4:854d7e00
 r10:00000000 r9:854d7e00 r8:80287e08 r7:eb495e60 r6:854d7e80 r5:84a20000
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:605:4911 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:605   state:D stack:0     pid:4911  tgid:4911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000013 r6:eb4a1d8c r5:84a21800
 r4:84a21800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a21800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a21800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e05d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550578c r4:85505400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550578c r4:8551c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a21800 r8:8551c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c900 r8:80287e08 r7:eb44de60 r6:854d7f00 r5:84a21800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a1fb0 to 0xeb4a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7b00
INFO: task kworker/1:605:4911 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:00000000
dd20:                   dbace000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:606:4913 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:606   state:D stack:0     pid:4913  tgid:4913  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:84a23000
 r4:84a23000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a23000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a23000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e069d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85505b8c r4:85505800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85505b8c r4:8551c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a23000 r8:8551c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551c980 r8:80287e08 r7:eb4a1e60 r6:854d7f80 r5:84a23000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a9fb0 to 0xeb4a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7d80
INFO: task kworker/1:606:4913 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dbed6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:607:4916 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:607   state:D stack:0     pid:4916  tgid:4916  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:84a22400
 r4:84a22400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a22400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a22400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e07a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85505f8c r4:85505c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85505f8c r4:8551ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a22400 r8:8551ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ca00 r8:80287e08 r7:eb4a9e60 r6:8551e000 r5:84a22400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b5fb0 to 0xeb4b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7dc0
INFO: task kworker/1:607:4916 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dc154000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:608:4917 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:608   state:D stack:0     pid:4917  tgid:4917  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:85591800
 r4:85591800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85591800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85591800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85506f8c r4:85506c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85506f8c r4:8551ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85591800 r8:8551caac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551ca80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ca80 r8:80287e08 r7:eb4b5e60 r6:8551cb00 r5:85591800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb499fb0 to 0xeb499ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7e80
INFO: task kworker/1:608:4917 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dc399000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:609:4919 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:609   state:D stack:0     pid:4919  tgid:4919  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:85594800
 r4:85594800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85594800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85594800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0825000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550638c r4:85506000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550638c r4:8551cb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85594800 r8:8551cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551cb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551cb80 r8:80287e08 r7:eb499e60 r6:8551cc00 r5:85594800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854c7940
INFO: task kworker/1:609:4919 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dc81c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:610:4921 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:610   state:D stack:0     pid:4921  tgid:4921  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:85595400
 r4:85595400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85595400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d5580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85595400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0949000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550678c r4:85506400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550678c r4:8551cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85595400 r8:8551ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551cc80 r8:80287e08 r7:eb499e60 r6:8551cd00 r5:85595400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b9fb0 to 0xeb4b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5200
INFO: task kworker/1:610:4921 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dce4d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:611:4922 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:611   state:D stack:0     pid:4922  tgid:4922  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:85596000
 r4:85596000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85596000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df180
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85596000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85506b8c r4:85506800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85506b8c r4:8551cd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85596000 r8:8551cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551cd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551cd80 r8:80287e08 r7:eb499e60 r6:8551ce00 r5:85596000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb49dfb0 to 0xeb49dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854d5200
INFO: task kworker/1:611:4922 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
dd20:                   dce4d000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:612:4925 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:612   state:D stack:0     pid:4925  tgid:4925  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000013 r6:eb4bdd8c r5:85596c00
 r4:85596c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85596c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85596c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550738c r4:85507000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550738c r4:8551ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85596c00 r8:8551ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ce80 r8:80287e08 r7:eb499e60 r6:8551cf00 r5:85596c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4bdfb0 to 0xeb4bdff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:00000000
 r5:00001000 r4:ed8b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8530a300
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:8530e480
      Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:84a20c00
 r4:84a20c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a20c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaced000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550778c r4:85507400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550778c r4:8551cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a20c00 r8:8551cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8551cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551cf80 r8:80287e08 r7:eb4bde60 r6:8551e080 r5:84a20c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4cdfb0 to 0xeb4cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854df080
INFO: task kworker/1:613:4927 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   dd764000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:614:4929 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:614   state:D stack:0     pid:4929  tgid:4929  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000013 r6:eb4d5d8c r5:84a25400
 r4:84a25400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a25400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfbc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a25400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85508b8c r4:85508800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85508b8c r4:8555b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a25400 r8:8555b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b000 r8:80287e08 r7:eb4cde60 r6:8551e100 r5:84a25400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d5fb0 to 0xeb4d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854df080
INFO: task kworker/1:614:4929 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   de4a6000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:615:4930 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:615   state:D stack:0     pid:4930  tgid:4930  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:84a23c00
 r4:84a23c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a23c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df6c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:85507b8c r4:8555b080
 r10:00000000 r9:8555b080 r8:80287e08 r7:eb4d5e60 r6:8551e180 r5:84a23c00
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:8530a300
Exception stack(0xeae7dfb0 to 0xeae7dff8)
      Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df800
 r7:ddde2d80 r6:83018200 r5:85507f8c r4:8555b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b20000 r8:8555b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b100 r8:80287e08 r7:eb4d5e60 r6:8551e200 r5:84b20000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e5fb0 to 0xeb4e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854df540
INFO: task kworker/1:616:4933 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   ded3c000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:617:4935 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:617   state:D stack:0     pid:4935  tgid:4935  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000113 r6:eb4edd8c r5:84b21800
 r4:84b21800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b21800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:854df680
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
dd20:                   defb0000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
      Not tainted 6.15.0-rc7-syzkaller #0
 r4:84b22400
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfa80
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:8550878c r4:8555b200
 r10:00000000 r9:8555b200 r8:80287e08 r7:eb4d5e60 r6:8551e300 r5:84b22400
 r4:854df680
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:ed8b3000
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
      Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r7:ddde2d80 r6:83018200 r5:85508f8c r4:8555b280
 r10:61c88647 r9:84b20c00 r8:8555b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b280 r8:80287e08 r7:eb4d5e60 r6:8551e380 r5:84b20c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb509fb0 to 0xeb509ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854df900
INFO: task kworker/1:619:4939 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   df6eb000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd538c r4:85cd5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd538c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:620:4941 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:620   state:D stack:0     pid:4941  tgid:4941  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:84b24800
 r4:84b24800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b24800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dff80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b24800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb119000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550978c r4:85509400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550978c r4:8555b300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b24800 r8:8555b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b300 r8:80287e08 r7:eb509e60 r6:8551e400 r5:84b24800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb511fb0 to 0xeb511ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854dfb40
INFO: task kworker/1:620:4941 is blocked on a mutex likely owned by task kworker/1:417:4402.
task:kworker/1:417   state:R  running task     stack:0     pid:4402  tgid:4402  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:83a7bc00 r8:80200be4 r7:eae7dd5c r6:ffffffff r5:83a7bc00
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeae7dd28 to 0xeae7dd70)
dd20:                   df9ba000 df9c1000 00000001 80239b98 7f3cb000 00000001
dd40: 82ac15a0 7f3cb000 df9c1000 8280c928 82ac21c4 eae7dda4 eae7dda8 eae7dd78
dd60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eae7ddc0 r5:eae7de08
 r4:eae7ddc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afdc0
 r4:00000000
 r5:00001000 r4:ed8b3000
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84b23c00
 r4:00000000
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:61c88647 r9:84b23c00 r8:8555b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0:                                     00000000 00000000 00000000 00000000
 r4:854dfb40
Workqueue: events bpf_prog_free_deferred
 r4:83a7bc00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850afec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:83a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ed8f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85cd578c r4:85cd5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85cd578c r4:8530a300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:83a7bc00 r8:8530a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530a300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530a300 r8:80287e08 r7:eae41e60 r6:8520ab00 r5:83a7bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8530e480
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:622:4944 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:622   state:D stack:0     pid:4944  tgid:4944  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:84b23000
 r4:84b23000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b23000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08
 r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8550a38c r4:8550a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550a38c r4:8555b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8555b400 r8:80287e08 r7:eb511e60 r6:8551e500 r5:84b23000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 90070113 ffffffff
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:623   state:D stack:0     pid:4946  tgid:4946  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08
 r5:85509b8c r4:85509800
 r7:ddde2d80 r6:83018200 r5:85509b8c r4:8555b480
 r4:8555b480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b480 r8:80287e08 r7:eb51de60 r6:8551e580 r5:84b25400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb525fb0 to 0xeb525ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8551fdc0
INFO: task kworker/1:623:4946 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   7f8b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 90070113 ffffffff
 r5:90070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:624:4947 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:624   state:D stack:0     pid:4947  tgid:4947  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:84b26c00
 r4:84b26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb343000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85509f8c r4:85509c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85509f8c r4:8555b500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b26c00 r8:8555b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b500 r8:80287e08 r7:eb51de60 r6:8551e600 r5:84b26c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb529fb0 to 0xeb529ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854dfd80
INFO: task kworker/1:624:4947 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   7fcbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:286:4950 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:286   state:D stack:0     pid:4950  tgid:4950  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:84b26000
 r4:84b26000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b26000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b26000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb30b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541ab8c r4:8541a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541ab8c r4:8551e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b26000 r8:8551e6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551e680 r8:80287e08 r7:eb495e60 r6:8551e700 r5:84b26000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c5fb0 to 0xeb4c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85561c40
INFO: task kworker/0:286:4950 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80463000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:287:4953 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:287   state:D stack:0     pid:4953  tgid:4953  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000013 r6:eb4c1d8c r5:84a26c00
 r4:84a26c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a26c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb57d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541b38c r4:8541b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541b38c r4:8551e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a26c00 r8:8551e7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551e780 r8:80287e08 r7:eb495e60 r6:8551e800 r5:84a26c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c1fb0 to 0xeb4c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85561bc0
INFO: task kworker/0:287:4953 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80463000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:625:4955 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:625   state:D stack:0     pid:4955  tgid:4955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:84a26000
 r4:84a26000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84a26000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb371000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550a78c r4:8550a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550a78c r4:8555b580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a26000 r8:8555b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b580 r8:80287e08 r7:eb51de60 r6:8551e880 r5:84a26000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f180
INFO: task kworker/1:625:4955 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80519000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:626:4957 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:626   state:D stack:0     pid:4957  tgid:4957  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85548000
 r4:85548000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85548000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb37f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550ab8c r4:8550a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550ab8c r4:8555b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85548000 r8:8555b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b600 r8:80287e08 r7:eb551e60 r6:8551e900 r5:85548000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb559fb0 to 0xeb559ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f240
INFO: task kworker/1:626:4957 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80a8e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:627:4959 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:627   state:D stack:0     pid:4959  tgid:4959  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:85549800
 r4:85549800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85549800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85549800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb549000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550af8c r4:8550ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550af8c r4:8555b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85549800 r8:8555b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b680 r8:80287e08 r7:eb559e60 r6:8551e980 r5:85549800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb569fb0 to 0xeb569ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f3c0
INFO: task kworker/1:627:4959 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80d88000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:628:4960 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:628   state:D stack:0     pid:4960  tgid:4960  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:85592400
 r4:85592400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85592400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556fc00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85592400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0179000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550b78c r4:8550b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550b78c r4:8555b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85592400 r8:8555b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b700 r8:80287e08 r7:eb569e60 r6:8555b780 r5:85592400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb52dfb0 to 0xeb52dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f3c0
INFO: task kworker/1:628:4960 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   80d88000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:629:4962 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:629   state:D stack:0     pid:4962  tgid:4962  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:85593c00
 r4:85593c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85593c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556f880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85593c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb565000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550b38c r4:8550b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550b38c r4:8555b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85593c00 r8:8555b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b800 r8:80287e08 r7:eb52de60 r6:8555b880 r5:85593c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb555fb0 to 0xeb555ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f3c0
INFO: task kworker/1:629:4962 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   815b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:630:4964 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:630   state:D stack:0     pid:4964  tgid:4964  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:85459800
 r4:85459800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85459800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85459800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae11000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550c38c r4:8550c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550c38c r4:8555b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85459800 r8:8555b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555b900 r8:80287e08 r7:eb52de60 r6:8555b980 r5:85459800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb581fb0 to 0xeb581ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556f780
INFO: task kworker/1:630:4964 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   815b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:288:4966 blocked for more than 460 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:288   state:D stack:0     pid:4966  tgid:4966  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:85548c00
 r4:85548c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85548c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85548c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb58d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541b78c r4:8541b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541b78c r4:8551ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85548c00 r8:8551ea2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ea00 r8:80287e08 r7:eb4c1e60 r6:8551ea80 r5:85548c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb56dfb0 to 0xeb56dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577100
INFO: task kworker/0:288:4966 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   81b98000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:4968 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289   state:D stack:0     pid:4968  tgid:4968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:8554b000
 r4:8554b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb599000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541bb8c r4:8541b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541bb8c r4:8551eb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554b000 r8:8551eb2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551eb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551eb00 r8:80287e08 r7:eb56de60 r6:8551eb80 r5:8554b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb591fb0 to 0xeb591ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577200
INFO: task kworker/0:289:4968 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   81b98000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:290:4970 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:290   state:D stack:0     pid:4970  tgid:4970  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:8554bc00
 r4:8554bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d078c r4:855d0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d078c r4:8551ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554bc00 r8:8551ec2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ec00 r8:80287e08 r7:eb591e60 r6:8551ec80 r5:8554bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb59dfb0 to 0xeb59dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577380
INFO: task kworker/0:290:4970 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   81e7c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:291:4972 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:291   state:D stack:0     pid:4972  tgid:4972  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:8554c800
 r4:8554c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8541bf8c r4:8541bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8541bf8c r4:8551ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554c800 r8:8551ed2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ed00 r8:80287e08 r7:eb59de60 r6:8551ed80 r5:8554c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a9fb0 to 0xeb5a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577500
INFO: task kworker/0:291:4972 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   823d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:292:4976 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:292   state:D stack:0     pid:4976  tgid:4976  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:8554d400
 r4:8554d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dffb5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6878c r4:84b68400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6878c r4:8551ee00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554d400 r8:8551ee2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551ee00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ee00 r8:80287e08 r7:eb59de60 r6:8551ee80 r5:8554d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b5fb0 to 0xeb5b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577780
INFO: task kworker/0:292:4976 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   823d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:293:4977 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:293   state:D stack:0     pid:4977  tgid:4977  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:8554e000
 r4:8554e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0201000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d038c r4:855d0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d038c r4:8551ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554e000 r8:8551ef2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8551ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8551ef00 r8:80287e08 r7:eb59de60 r6:8551ef80 r5:8554e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb585fb0 to 0xeb585ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577780
INFO: task kworker/0:293:4977 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   82c3a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:631:4979 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:631   state:D stack:0     pid:4979  tgid:4979  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:85598000
 r4:85598000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85598000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d180
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85598000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550bb8c r4:8550b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550bb8c r4:8555ba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85598000 r8:8555ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555ba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555ba00 r8:80287e08 r7:eb581e60 r6:8555ba80 r5:85598000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb29dfb0 to 0xeb29dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556fe00
INFO: task kworker/1:631:4979 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   82f6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:294:4981 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:294   state:D stack:0     pid:4981  tgid:4981  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:8559a400
 r4:8559a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8559a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8559a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaad7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d0b8c r4:855d0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d0b8c r4:8556b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8559a400 r8:8556b02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556b000 r8:80287e08 r7:eb59de60 r6:8555bb00 r5:8559a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3e1fb0 to 0xeb3e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577b40
INFO: task kworker/0:294:4981 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   83095000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:295:4983 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:295   state:D stack:0     pid:4983  tgid:4983  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:8554ec00
 r4:8554ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85606280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfac7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d2b8c r4:855d2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d2b8c r4:8556b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554ec00 r8:8556b0ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556b080 r8:80287e08 r7:eb3e1e60 r6:8556b100 r5:8554ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb291fb0 to 0xeb291ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577c80
INFO: task kworker/0:295:4983 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r5:80070113 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:296:4984 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:296   state:D stack:0     pid:4984  tgid:4984  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:8554a400
 r4:8554a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8554a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8554a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb66b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d0f8c r4:855d0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d0f8c r4:8556b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8554a400 r8:8556b1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556b180 r8:80287e08 r7:eb291e60 r6:8556b200 r5:8554a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577c80
INFO: task kworker/0:296:4984 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   83962000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:632:4987 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:632   state:D stack:0     pid:4987  tgid:4987  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:85550000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d2c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550bf8c r4:8550bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550bf8c r4:8555bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85550000 r8:8555bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555bb80 r8:80287e08 r7:eb581e60 r6:8556b280 r5:85550000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb401fb0 to 0xeb401ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555d240
INFO: task kworker/1:632:4987 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   83962000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:633:4990 blocked for more than 461 seconds.
 r4:85550c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d900
 r5:8550d38c r4:8550d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550d38c r4:8555bc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85550c00 r8:8555bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555bc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555bc00 r8:80287e08 r7:eb581e60 r6:8556b300 r5:85550c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555d240
INFO: task kworker/1:633:4990 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   83bb8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:634:4992 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:634   state:D stack:0     pid:4992  tgid:4992  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85553000
 r4:85553000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85553000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85553000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550c78c r4:8550c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550c78c r4:8555bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85553000 r8:8555bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555bc80 r8:80287e08 r7:eb491e60 r6:8556b380 r5:85553000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5bdfb0 to 0xeb5bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555d240
INFO: task kworker/1:634:4992 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   83cf0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:635:4993 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:635   state:D stack:0     pid:4993  tgid:4993  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:85553c00
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85553c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550cb8c r4:8550c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550cb8c r4:8555bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85553c00 r8:8555bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555bd00 r8:80287e08 r7:eb491e60 r6:8556b400 r5:85553c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c1fb0 to 0xeb5c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555d3c0
INFO: task kworker/1:635:4993 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   842a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:636:4995 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:636   state:D stack:0     pid:4995  tgid:4995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:85598c00
 r4:85598c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85598c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8550cf8c r4:8550cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550cf8c r4:8555bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85598c00 r8:8555bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555bd80 r8:80287e08 r7:eb491e60 r6:8555be00 r5:85598c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:637:4998 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:637   state:D stack:0     pid:4998  tgid:4998  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:8559b000
 r4:8559b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8559b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dbc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8559b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb18b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550db8c r4:8550d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550db8c r4:8555be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8559b000 r8:8555beac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8555be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8555be80 r8:80287e08 r7:eb491e60 r6:8555bf00 r5:8559b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c5fb0 to 0xeb5c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555d780
INFO: task kworker/1:637:4998 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   848a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:638:4999 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:638   state:D stack:0     pid:4999  tgid:4999  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85552400
 r4:85552400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85552400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555db00
 r4:00000000
 r9:83018205 r8:85552400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
 r5:8550d78c r4:8550d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85552400 r8:8555bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb5d1fb0 to 0xeb5d1ff8)
INFO: task kworker/1:638:4999 is blocked on a mutex likely owned by task kworker/1:426:4465.
 r5:80070113 r4:80239bb0
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8550f38c r4:8550f000
 r10:61c88647 r9:85555400 r8:8557202c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572000 r8:80287e08 r7:eb5c5e60 r6:8556b500 r5:85555400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5ddfb0 to 0xeb5ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555db80
INFO: task kworker/1:639:5002 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   85263000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:640:5004 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:640   state:D stack:0     pid:5004  tgid:5004  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:85554800
 r4:85554800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85554800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dd40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85554800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb205000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550df8c r4:8550dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550df8c r4:85572080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85554800 r8:855720ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572080 r8:80287e08 r7:eb5dde60 r6:8556b580 r5:85554800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e5fb0 to 0xeb5e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555db80
INFO: task kworker/1:640:5004 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   85604000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:852cfa40
 r4:85551800
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8550e38c r4:8550e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85551800 r8:8557212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:82ac21e4
 r5:00001000 r4:dfd17000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:85556000
 r4:85556000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85556000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dfc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85556000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb259000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550e78c r4:8550e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550e78c r4:85572180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85556000 r8:855721ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572180 r8:80287e08 r7:eb5dde60 r6:8556b680 r5:85556000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5f5fb0 to 0xeb5f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555dd00
INFO: task kworker/1:642:5008 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   85a2a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:643:5009 blocked for more than 461 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ff80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85556c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb299000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550eb8c r4:8550e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550eb8c r4:85572200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85556c00 r8:8557222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572200 r8:80287e08 r7:eb5dde60 r6:8556b700 r5:85556c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5f9fb0 to 0xeb5f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555de40
INFO: task kworker/1:643:5009 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   85eca000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:644:5011 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:644   state:D stack:0     pid:5011  tgid:5011  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85608c00
 r4:85608c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85608c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb39c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550ef8c r4:8550ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550ef8c r4:85572280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85608c00 r8:855722ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572280 r8:80287e08 r7:eb5dde60 r6:8556b780 r5:85608c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb601fb0 to 0xeb601ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85577ec0
INFO: task kworker/1:644:5011 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   862de000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:645:5013 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
task:kworker/1:645   state:D stack:0     pid:5013  tgid:5013  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08
 r5:00001000 r4:eb3e9000
 r5:8550f78c r4:8550f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:646:5015 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:646   state:D stack:0     pid:5015  tgid:5015  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:85609800
 r4:85609800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85609800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85609800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb429000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8550ff8c r4:8550fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550ff8c r4:85572380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85609800 r8:855723ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572380 r8:80287e08 r7:eb609e60 r6:8556b880 r5:85609800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb611fb0 to 0xeb611ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8557f000
INFO: task kworker/1:646:5015 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   86ab6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:647:5017 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:647   state:D stack:0     pid:5017  tgid:5017  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb619d84 r8:00000002 r7:60000013 r6:eb619d8c r5:8560a400
 r4:8560a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8560a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r9:83018205 r8:8560a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
 r5:8550fb8c r4:8550f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8550fb8c r4:85572400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85572400
 r10:00000000 r9:85572400 r8:80287e08 r7:eb611e60 r6:8556b900 r5:8560a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb619fb0 to 0xeb619ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8557f180
INFO: task kworker/1:647:5017 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   86d96000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:648:5020 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:648   state:D stack:0     pid:5020  tgid:5020  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:8560c800
 r4:8560c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8560c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f7c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8560c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb449000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8551078c r4:85510400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8551078c r4:85572480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8560c800 r8:855724ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572480 r8:80287e08 r7:eb611e60 r6:8556b980 r5:8560c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb625fb0 to 0xeb625ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8557f200
INFO: task kworker/1:648:5020 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   86f1d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:649:5021 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:649   state:D stack:0     pid:5021  tgid:5021  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:8560bc00
 r4:8560bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8560bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f6c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb437000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8551038c r4:85510000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8551038c r4:85572500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8560bc00 r8:8557252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572500 r8:80287e08 r7:eb625e60 r6:8556ba00 r5:8560bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb629fb0 to 0xeb629ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8557f600
INFO: task kworker/1:649:5021 is blocked on a mutex likely owned by task kworker/1:426:4465.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8700d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:650   state:D stack:0     pid:5024  tgid:5024  ppid:2      task_flags:0x4208060 flags:0x00000000
 r9:83018205 r8:8560b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
 r5:8551138c r4:85511000
 r7:ddde2d80 r6:83018200 r5:8551138c r4:85572580
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   877c1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r5:852bd78c r4:852bd400
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85510b8c r4:85510800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85572600
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:652:5027 blocked for more than 461 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:652   state:D stack:0     pid:5027  tgid:5027  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:8560e000
 r4:8560e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8560e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08
 r4:00000000
 r5:85510f8c r4:85510c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85572680
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r5:80070113 r4:80239bb0
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8551178c r4:85511400
 r10:61c88647 r9:84ab8000 r8:8557272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:654:5032 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:654   state:D stack:0     pid:5032  tgid:5032  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:84ab8c00
 r4:84ab8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557fe40
 r5:85511b8c r4:85511800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r4:852cfa40
 r5:84ab9800 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85512f8c r4:85512c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85512f8c r4:85572800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85572800
Exception stack(0xeb65dfb0 to 0xeb65dff8)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:656:5035 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557f940
 r5:85511f8c r4:85511c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85511f8c r4:85572880
 r10:61c88647 r9:84aba400 r8:855728ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8832c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8551238c r4:85512000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb639fb0 to 0xeb639ff8)
INFO: task kworker/1:657:5037 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8885c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:297:5039 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:297   state:D stack:0     pid:5039  tgid:5039  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:8559d400
 r4:8559d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8559d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856445c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb68b000
 r5:855d138c r4:855d1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d138c r4:8556be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8556be00 r8:80287e08 r7:eb291e60 r6:85572a00 r5:8559d400
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb67dfb0 to 0xeb67dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85644300
INFO: task kworker/0:297:5039 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   88953000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
 r4:8530ac00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:658   state:D stack:0     pid:5041  tgid:5041  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589040
 r5:8551278c r4:85512400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8551278c r4:85572a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8559e000 r8:85572aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572a80 r8:80287e08 r7:eb65de60 r6:85572b00 r5:8559e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb689fb0 to 0xeb689ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85589080
INFO: task kworker/1:658:5041 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   88b27000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
 r5:85599800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08
 r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb69b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85512b8c r4:85512800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:85512b8c r4:8556be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85599800 r8:8556beac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556be80 r8:80287e08 r7:eb291e60 r6:85572b80 r5:85599800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb699fb0 to 0xeb699ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85644440
INFO: task kworker/0:298:5043 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   88d29000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:852cfa40
task:kworker/1:659   state:D stack:0     pid:5045  tgid:5045  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856447c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8559bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d178c r4:855d1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:855d178c r4:85572c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8559bc00 r8:85572c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572c00 r8:80287e08 r7:eb65de60 r6:85572c80 r5:8559bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a5fb0 to 0xeb6a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85589540
INFO: task kworker/1:659:5045 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8902a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:299   state:D stack:0     pid:5047  tgid:5047  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:8545bc00
 r4:8545bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8545bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8545bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d1b8c r4:855d1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d1b8c r4:8556bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8545bc00 r8:8556bf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556bf00 r8:80287e08 r7:eb291e60 r6:85572d00 r5:8545bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a9fb0 to 0xeb6a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85644700
INFO: task kworker/0:299:5047 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8912d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:660:5050 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:660   state:D stack:0     pid:5050  tgid:5050  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:855a9800
 r4:855a9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855894c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb703000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85513f8c r4:85513c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85513f8c r4:85572d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a9800 r8:85572dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85572d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85572d80 r8:80287e08 r7:eb65de60 r6:85572e00 r5:855a9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c1fb0 to 0xeb6c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855898c0
INFO: task kworker/1:660:5050 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:661:5051 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:661   state:D stack:0     pid:5051  tgid:5051  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:855aa400
 r4:855aa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855aa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8551338c r4:85513000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8551338c r4:85572e80
 r10:61c88647 r9:855aa400 r8:85572eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   89630000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:5053 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300   state:D stack:0     pid:5053  tgid:5053  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6d5d84 r8:00000002 r7:60000113 r6:eb6d5d8c r5:855ab000
 r4:855ab000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018005 r8:855ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
 r5:855d1f8c r4:855d1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d1f8c r4:8556bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855ab000 r8:8556bfac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8556bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8556bf80 r8:80287e08 r7:eb291e60 r6:85572f80 r5:855ab000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d5fb0 to 0xeb6d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85644740
INFO: task kworker/0:300:5053 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:5055 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
 r5:855abc00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8551378c r4:85513400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8551378c r4:8558b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855abc00 r8:8558b02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558b000 r8:80287e08 r7:eb291e60 r6:85582000 r5:855abc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e5fb0 to 0xeb6e5ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r5:80070113 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
 r4:855a8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85513b8c r4:85513800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85513b8c r4:85582080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a8000 r8:855820ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582080 r8:80287e08 r7:eb6c1e60 r6:85582100 r5:855a8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e1fb0 to 0xeb6e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85589f00
INFO: task kworker/1:662:5057 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   89d79000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:302:5059 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:302   state:D stack:0     pid:5059  tgid:5059  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:84abb000
 r4:84abb000
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r5:855d238c r4:855d2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84abb000 r8:8558b0ac r7:82804d40 r6:dddced80 r5:dddceda0
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:855ac800
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8567cf8c r4:8567cc00
 r10:61c88647 r9:855ac800 r8:855821ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb649fb0 to 0xeb649ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855892c0
INFO: task kworker/1:663:5061 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8a5d0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:664   state:D stack:0     pid:5064  tgid:5064  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8567c38c r4:8567c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:665   state:D stack:0     pid:5065  tgid:5065  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:855ae000
 r4:855ae000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855ae000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8567c78c r4:8567c400
Exception stack(0xeb719fb0 to 0xeb719ff8)
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000001
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:666:5067 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:666   state:D stack:0     pid:5067  tgid:5067  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:855aec00
 r4:855aec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855aec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558e380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb727000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567cb8c r4:8567c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567cb8c r4:85582480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855aec00 r8:855824ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:80070113 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:667:5069 blocked for more than 462 seconds.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r5:8567d38c r4:8567d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567d38c r4:85582580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84abbc00 r8:855825ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:84abd400
 r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:855d2f8c r4:855d2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d2f8c r4:8558b200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84abd400 r8:8558b22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558b200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558b200 r8:80287e08 r7:eb291e60 r6:8558b280 r5:84abd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb731fb0 to 0xeb731ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85606180
INFO: task kworker/0:303:5073 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
 r4:eaf29dc0
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08
 r5:855d338c r4:855d3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8558b300 r8:80287e08 r7:eb731e60 r6:8558b380 r5:84abe000
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8b811000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:668:5078 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:668   state:D stack:0     pid:5078  tgid:5078  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:8560d400
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018205 r8:8560d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
 r5:8567d78c r4:8567d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567d78c r4:85582600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8560d400 r8:8558262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582600 r8:80287e08 r7:eb735e60 r6:8558b400 r5:8560d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb749fb0 to 0xeb749ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558e740
INFO: task kworker/1:668:5078 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8bd51000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8567db8c r4:8567d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0:                                     00000000 00000000 00000000 00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:670:5081 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:670   state:D stack:0     pid:5081  tgid:5081  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:84ae8000
 r4:84ae8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558e300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafa1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567ef8c r4:8567ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567ef8c r4:85582700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae8000 r8:8558272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582700 r8:80287e08 r7:eb751e60 r6:8558b500 r5:84ae8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb755fb0 to 0xeb755ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558e980
INFO: task kworker/1:670:5081 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8c434000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:8530ac00
9fa0:                                     00000000 00000000 00000000 00000000
 r5:84ae8c00 r4:8291a680
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ed80
 r5:8567df8c r4:8567dc00
 r7:ddde2d80 r6:83018200 r5:8567df8c r4:85582780
 r4:8558e980
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:305:5084 blocked for more than 462 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:305   state:D stack:0     pid:5084  tgid:5084  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:84ae9800
 r4:84ae9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e01d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6938c r4:84b69000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6938c r4:8558b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae9800 r8:8558b62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558b600 r8:80287e08 r7:eb701e60 r6:8558b680 r5:84ae9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:84aeb000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:8567e38c r4:8567e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:84aeb000 r8:8558282c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582800 r8:80287e08 r7:eb755e60 r6:8558b700 r5:84aeb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb761fb0 to 0xeb761ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558ec00
INFO: task kworker/1:672:5087 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8cf37000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:306:5088 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:306   state:D stack:0     pid:5088  tgid:5088  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb765d84 r8:00000002 r7:60000113 r6:eb765d8c r5:84aebc00
 r4:84aebc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84aebc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:855d378c r4:855d3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d378c r4:8558b780
 r4:8558b780
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:00000000
 r5:80070113 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558efc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84aea400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567e78c r4:8567e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567e78c r4:85582880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84aea400 r8:855828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582880 r8:80287e08 r7:eb755e60 r6:8558b880 r5:84aea400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb76dfb0 to 0xeb76dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558ec80
INFO: task kworker/1:673:5090 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8d400000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:674:5092 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:674   state:D stack:0     pid:5092  tgid:5092  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:84aec800
 r4:84aec800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84aec800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:8567eb8c r4:8567e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567eb8c r4:85582900
 r10:61c88647 r9:84aec800 r8:8558292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:675:5094 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:675   state:D stack:0     pid:5094  tgid:5094  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000013 r6:eb77dd8c r5:84aed400
 r4:84aed400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84aed400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84aed400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567f78c r4:8567f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567f78c r4:85582980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84aed400 r8:855829ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582980 r8:80287e08 r7:eb755e60 r6:8558b980 r5:84aed400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb77dfb0 to 0xeb77dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558ef80
INFO: task kworker/1:675:5094 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8d9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:676   state:D stack:0     pid:5096  tgid:5096  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:84abec00
 r4:84abec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84abec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee5c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84abec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb093000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567f38c r4:8567f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567f38c r4:85582a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84abec00 r8:85582a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582a00 r8:80287e08 r7:eb77de60 r6:85582a80 r5:84abec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb74dfb0 to 0xeb74dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8557ff40
INFO: task kworker/1:676:5096 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8d9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r4:8530ac00
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:677:5099 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:677   state:D stack:0     pid:5099  tgid:5099  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb785d84 r8:00000002 r7:60000013 r6:eb785d8c r5:855a8c00
 r4:855a8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c180
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8567fb8c r4:8567f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8567fb8c r4:85582b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a8c00 r8:85582b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582b00 r8:80287e08 r7:eb77de60 r6:85582b80 r5:855a8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb785fb0 to 0xeb785ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8558e480
INFO: task kworker/1:677:5099 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8dd87000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:678:5101 blocked for more than 463 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:855b0000
 r4:855b0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8567ff8c r4:8567fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:855b0000 r8:85582c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:679:5103 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:679   state:D stack:0     pid:5103  tgid:5103  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb78dd84 r8:00000002 r7:60000013 r6:eb78dd8c r5:84aee000
 r4:84aee000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84aee000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8568438c r4:85684000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
dfa0:                                     00000000 00000000 00000000 00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r5:852bd78c r4:852bd400
 r4:00000001
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c880
 r5:85684f8c r4:85684c00
 r7:ddde2d80 r6:83018200 r5:85684f8c r4:85582d80
 r10:00000000 r9:85582d80 r8:80287e08 r7:eb78de60 r6:8558ba80 r5:84aeec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb795fb0 to 0xeb795ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8564c2c0
INFO: task kworker/1:680:5105 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8e17f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:681:5106 blocked for more than 463 seconds.
 r4:855a0000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08
 r9:83018205 r8:855a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
 r5:8568478c r4:85684400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568478c r4:85582e00
 r10:61c88647 r9:855a0000 r8:85582e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:681:5106 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8e381000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564c740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb34f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85684b8c r4:85684800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85684b8c r4:85582e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a1800 r8:85582eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85582e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85582e80 r8:80287e08 r7:eb795e60 r6:8558bb80 r5:855a1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a1fb0 to 0xeb7a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:82ac21e4
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8568538c r4:85685000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:684:5113 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:684   state:D stack:0     pid:5113  tgid:5113  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000113 r6:eb7b1d8c r5:855a2400
 r4:855a2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8568578c r4:85685400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568578c r4:85582f80
 r10:61c88647 r9:855a2400 r8:85582fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:852bd78c r4:852bd400
 r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:685:5114 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:685   state:D stack:0     pid:5114  tgid:5114  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:855a3c00
 r4:855a3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cc80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85685b8c r4:85685800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85685b8c r4:85656000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a3c00 r8:8565602c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656000 r8:80287e08 r7:eb7b1e60 r6:8558bd00 r5:855a3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7b5fb0 to 0xeb7b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8564c940
INFO: task kworker/1:685:5114 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8ee7e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
 r4:00000001
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85685f8c r4:85685c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85685f8c r4:85656080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a5400 r8:856560ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656080 r8:80287e08 r7:eb7b5e60 r6:8558bd80 r5:855a5400
 r4:8564cb00
 r4:00000000
 r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:855a6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cf40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb505000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8568638c r4:85686000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568638c r4:85656100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a6000 r8:8565612c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656100 r8:80287e08 r7:eb7bde60 r6:8558be00 r5:855a6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c1fb0 to 0xeb7c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8564cb80
INFO: task kworker/1:687:5119 is blocked on a mutex likely owned by task kworker/1:426:4465.
Call trace: 
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:688   state:D stack:0     pid:5121  tgid:5121  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:855a6c00
 r4:855a6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644ac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb519000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8568678c r4:85686400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568678c r4:85656180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a6c00 r8:856561ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656180 r8:80287e08 r7:eb7c1e60 r6:8558be80 r5:855a6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c5fb0 to 0xeb7c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8564cdc0
INFO: task kworker/1:688:5121 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   8fc9c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:689:5123 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:689   state:D stack:0     pid:5123  tgid:5123  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:855a4800
 r4:855a4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856520c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb563000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85686f8c r4:85686c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85686f8c r4:85656200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a4800 r8:8565622c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85656200 r8:80287e08 r7:eb7c5e60 r6:8558bf00 r5:855a4800
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:690:5125 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:690   state:D stack:0     pid:5125  tgid:5125  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:855a3000
 r4:855a3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855a3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r9:83018205 r8:855a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
 r5:85686b8c r4:85686800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85686b8c r4:85656280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855a3000 r8:856562ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656280 r8:80287e08 r7:eb7c9e60 r6:8558bf80 r5:855a3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7cdfb0 to 0xeb7cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8564cfc0
INFO: task kworker/1:690:5125 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9074e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:8559ec00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8559ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb597000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8568738c r4:85687000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568738c r4:85656300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8559ec00 r8:8565632c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656300 r8:80287e08 r7:eb7c9e60 r6:8565e000 r5:8559ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d1fb0 to 0xeb7d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85652000
INFO: task kworker/1:691:5126 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   90b26000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
 r5:85620000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8568778c r4:85687400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8568778c r4:85656380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85620000 r8:856563ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656380 r8:80287e08 r7:eb7d1e60 r6:8565e080 r5:85620000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d5fb0 to 0xeb7d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85652140
INFO: task kworker/1:692:5127 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   90e5a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:00001000 r4:dfd17000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:307   state:D stack:0     pid:5130  tgid:5130  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:85620c00
 r4:85620c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85620c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85620c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb589000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855d3b8c r4:855d3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855d3b8c r4:8565e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85620c00 r8:8565e12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e100 r8:80287e08 r7:eb55de60 r6:8565e180 r5:85620c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb741fb0 to 0xeb741ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85654d80
INFO: task kworker/0:307:5130 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9142b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:5131 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308   state:D stack:0     pid:5131  tgid:5131  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:85621800
 r4:85621800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85621800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85621800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f538c r4:855f5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f538c r4:8565e200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85621800 r8:8565e22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e200 r8:80287e08 r7:eb55de60 r6:8565e280 r5:85621800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb789fb0 to 0xeb789ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85654d80
INFO: task kworker/0:308:5131 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   91698000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:309:5137 blocked for more than 463 seconds.
task:kworker/0:309   state:D stack:0     pid:5137  tgid:5137  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:85623000
 r4:85623000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85623000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85623000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b68f8c r4:84b68c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b68f8c r4:8565e300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85623000 r8:8565e32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e300 r8:80287e08 r7:eb789e60 r6:8565e380 r5:85623000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb21dfb0 to 0xeb21dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85654340
INFO: task kworker/0:309:5137 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9197c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:693:5139 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:693   state:D stack:0     pid:5139  tgid:5139  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:85623c00
 r4:85623c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85623c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85623c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaec9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85687b8c r4:85687800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85687b8c r4:85656400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85623c00 r8:8565642c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656400 r8:80287e08 r7:eb7d5e60 r6:8565e400 r5:85623c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d9fb0 to 0xeb7d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85652400
INFO: task kworker/1:693:5139 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   91c9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:5141 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310   state:D stack:0     pid:5141  tgid:5141  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:85624800
 r4:85624800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85624800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85624800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaadb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f438c r4:855f4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f438c r4:8565e480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85624800 r8:8565e4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e480 r8:80287e08 r7:eb789e60 r6:8565e500 r5:85624800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7ddfb0 to 0xeb7ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f1c0
INFO: task kworker/0:310:5141 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   91f39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:5143 blocked for more than 463 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311   state:D stack:0     pid:5143  tgid:5143  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000013 r6:eb41dd8c r5:85625400
 r4:85625400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85625400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85625400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eab51000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f478c r4:855f4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f478c r4:8565e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85625400 r8:8565e5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e580 r8:80287e08 r7:eb789e60 r6:8565e600 r5:85625400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb41dfb0 to 0xeb41dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f100
INFO: task kworker/0:311:5143 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   921a8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:312:5145 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:312   state:D stack:0     pid:5145  tgid:5145  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:85626000
 r4:85626000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85626000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85626000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f4b8c r4:855f4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f4b8c r4:8565e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85626000 r8:8565e6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e680 r8:80287e08 r7:eb789e60 r6:8565e700 r5:85626000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5adfb0 to 0xeb5adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f100
INFO: task kworker/0:312:5145 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   924b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:694:5147 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:694   state:D stack:0     pid:5147  tgid:5147  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:85626c00
 r4:85626c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85626c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475080
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85626c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a438c r4:856a4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a438c r4:85656480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85626c00 r8:856564ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656480 r8:80287e08 r7:eb7d9e60 r6:8565e800 r5:85626c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c9fb0 to 0xeb5c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856527c0
INFO: task kworker/1:694:5147 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   92842000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:5148 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313   state:D stack:0     pid:5148  tgid:5148  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:85622400
 r4:85622400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85622400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565f7c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85622400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f4f8c r4:855f4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f4f8c r4:8565e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85622400 r8:8565e7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e780 r8:80287e08 r7:eb789e60 r6:8565e880 r5:85622400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5cdfb0 to 0xeb5cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f4c0
INFO: task kworker/0:313:5148 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   92b13000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:695:5150 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:695   state:D stack:0     pid:5150  tgid:5150  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85628000
 r4:85628000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85628000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb42f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f778c r4:855f7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:855f778c r4:85656500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85628000 r8:8565652c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85656500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85656500 r8:80287e08 r7:eb5c9e60 r6:8565e900 r5:85628000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b9fb0 to 0xeb5b9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856529c0
INFO: task kworker/1:695:5150 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   92dc3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:314:5152 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:314   state:D stack:0     pid:5152  tgid:5152  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85628c00
 r4:85628c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85628c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565fac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85628c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb075000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f578c r4:855f5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f578c r4:8565e980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85628c00 r8:8565e9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565e980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565e980 r8:80287e08 r7:eb789e60 r6:8565ea00 r5:85628c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f780
INFO: task kworker/0:314:5152 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9335e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:315:5153 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:315   state:D stack:0     pid:5153  tgid:5153  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:85629800
 r4:85629800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85629800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565fcc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85629800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f5b8c r4:855f5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f5b8c r4:8565ea80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85629800 r8:8565eaac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565ea80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565ea80 r8:80287e08 r7:eb5d5e60 r6:8565eb00 r5:85629800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5edfb0 to 0xeb5edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565f780
INFO: task kworker/0:315:5153 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   93591000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:316:5155 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:316   state:D stack:0     pid:5155  tgid:5155  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:8562b000
 r4:8562b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ffc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb219000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f5f8c r4:855f5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f5f8c r4:8565eb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562b000 r8:8565ebac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565eb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565eb80 r8:80287e08 r7:eb5ede60 r6:8565ec00 r5:8562b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb60dfb0 to 0xeb60dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565fb40
INFO: task kworker/0:316:5155 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   93591000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:5157 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317   state:D stack:0     pid:5157  tgid:5157  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:8562bc00
 r4:8562bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f6b8c r4:855f6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f6b8c r4:8565ec80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562bc00 r8:8565ecac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565ec80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565ec80 r8:80287e08 r7:eb60de60 r6:8565ed00 r5:8562bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb61dfb0 to 0xeb61dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565fb40
INFO: task kworker/0:317:5157 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   93c31000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:5160 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318   state:D stack:0     pid:5160  tgid:5160  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8562c800
 r4:8562c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564cfc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb261000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f638c r4:855f6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f638c r4:8565ed80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562c800 r8:8565edac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565ed80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565ed80 r8:80287e08 r7:eb61de60 r6:8565ee00 r5:8562c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e1fb0 to 0xeb5e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588080
INFO: task kworker/0:318:5160 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   93f2d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:5162 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319   state:D stack:0     pid:5162  tgid:5162  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:855b2400
 r4:855b2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f678c r4:855f6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f678c r4:8565ee80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b2400 r8:8565eeac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565ee80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565ee80 r8:80287e08 r7:eb61de60 r6:85656580 r5:855b2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb671fb0 to 0xeb671ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588240
INFO: task kworker/0:319:5162 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   94b0b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:5164 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320   state:D stack:0     pid:5164  tgid:5164  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:8562e000
 r4:8562e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f6f8c r4:855f6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f6f8c r4:8565ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562e000 r8:8565ef2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8565ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8565ef00 r8:80287e08 r7:eb61de60 r6:8565ef80 r5:8562e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb659fb0 to 0xeb659ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588240
INFO: task kworker/0:320:5164 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   94f3b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:5166 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321   state:D stack:0     pid:5166  tgid:5166  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:8562ec00
 r4:8562ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb413000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f738c r4:855f7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f738c r4:8558c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562ec00 r8:8558c02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c000 r8:80287e08 r7:eb659e60 r6:8558c080 r5:8562ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb62dfb0 to 0xeb62dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855883c0
INFO: task kworker/0:321:5166 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   94f3b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:852cfa40
INFO: task kworker/0:322:5169 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:322   state:D stack:0     pid:5169  tgid:5169  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:8562d400
 r4:8562d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8562d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8562d400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb43f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:855f7b8c r4:855f7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f7b8c r4:8558c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8562d400 r8:8558c12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c100 r8:80287e08 r7:eb62de60 r6:8558c180 r5:8562d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb679fb0 to 0xeb679ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855886c0
INFO: task kworker/0:322:5169 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9530b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r9:83018205 r8:8562a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
 r5:84449f8c r4:84449c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r5:80070113 r4:80239bb0
 r5:00001000 r4:dfd17000
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:85638000
 r4:85638000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85638000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588c80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85638000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb45f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ac38c r4:849ac000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ac38c r4:8558c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85638000 r8:8558c2ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c280 r8:80287e08 r7:eb679e60 r6:8558c300 r5:85638000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb685fb0 to 0xeb685ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588840
INFO: task kworker/0:323:5172 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   95b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:324:5174 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:324   state:D stack:0     pid:5174  tgid:5174  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:85638c00
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:855f7f8c r4:855f7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:855f7f8c r4:8558c380
 r10:00000000 r9:8558c380 r8:80287e08 r7:eb685e60 r6:8558c400 r5:85638c00
INFO: task kworker/0:324:5174 is blocked on a mutex likely owned by task kworker/1:426:4465.
9d20:                   95b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
9fa0:                                     00000000 00000000 00000000 00000000
task:kworker/0:325   state:D stack:0     pid:5176  tgid:5176  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565ff00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849acb8c r4:849ac800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849acb8c r4:8558c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85639800 r8:8558c4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c480 r8:80287e08 r7:eb685e60 r6:8558c500 r5:85639800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a1fb0 to 0xeb6a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588a80
INFO: task kworker/0:325:5176 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   961ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:326:5178 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:326   state:D stack:0     pid:5178  tgid:5178  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:8563b000
 r4:8563b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85588dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb479000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ac78c r4:849ac400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ac78c r4:8558c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563b000 r8:8558c5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c580 r8:80287e08 r7:eb6a1e60 r6:8558c600 r5:8563b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6bdfb0 to 0xeb6bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85588c40
INFO: task kworker/0:326:5178 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   96994000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:327:5179 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:327   state:D stack:0     pid:5179  tgid:5179  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:8563bc00
 r4:8563bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ad38c r4:849ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ad38c r4:8558c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563bc00 r8:8558c6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c680 r8:80287e08 r7:eb6a1e60 r6:8558c700 r5:8563bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b1fb0 to 0xeb6b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8565ff40
INFO: task kworker/0:327:5179 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   96994000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:852bd78c r4:852bd400
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:328:5182 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:328   state:D stack:0     pid:5182  tgid:5182  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6fdd84 r8:00000002 r7:60000113 r6:eb6fdd8c r5:855b5400
 r4:855b5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849acf8c r4:849acc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849acf8c r4:8558c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b5400 r8:8558c7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c780 r8:80287e08 r7:eb6b1e60 r6:85656680 r5:855b5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6fdfb0 to 0xeb6fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571080
INFO: task kworker/0:328:5182 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   96d3e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8530ac00
 r4:00000001
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:329:5184 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:329   state:D stack:0     pid:5184  tgid:5184  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:855b3c00
 r4:855b3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb613000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ad78c r4:849ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ad78c r4:8558c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b3c00 r8:8558c82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c800 r8:80287e08 r7:eb6b1e60 r6:85656700 r5:855b3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb715fb0 to 0xeb715ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571180
INFO: task kworker/0:329:5184 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   97390000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:330:5186 blocked for more than 464 seconds.
 r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:855b6000
 r5:855b6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849aeb8c r4:849ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849aeb8c r4:8558c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b6000 r8:8558c8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c880 r8:80287e08 r7:eb715e60 r6:85656780 r5:855b6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb72dfb0 to 0xeb72dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855712c0
INFO: task kworker/0:330:5186 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   97607000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:331:5187 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:331   state:D stack:0     pid:5187  tgid:5187  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:855b4800
 r4:855b4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb643000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:849adb8c r4:849ad800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849adb8c r4:8558c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b4800 r8:8558c92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558c900 r8:80287e08 r7:eb72de60 r6:85656800 r5:855b4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb73dfb0 to 0xeb73dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855712c0
INFO: task kworker/0:331:5187 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   97b79000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:332:5189 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:332   state:D stack:0     pid:5189  tgid:5189  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:855b0c00
 r4:855b0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08
 r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:849adf8c r4:849adc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849adf8c r4:8558c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b0c00 r8:8558c9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
 r4:00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r5:80070113 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:333:5191 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:333   state:D stack:0     pid:5191  tgid:5191  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000013 r6:eb7edd8c r5:855b3000
 r4:855b3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb681000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ae38c r4:849ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ae38c r4:8558ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b3000 r8:8558ca2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558ca00 r8:80287e08 r7:eb72de60 r6:85656900 r5:855b3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7edfb0 to 0xeb7edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855714c0
INFO: task kworker/0:333:5191 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   97ee2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r5:852bd78c r4:852bd400
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
task:kworker/0:334   state:D stack:0     pid:5193  tgid:5193  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:855b6c00
 r4:855b6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb69d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ae78c r4:849ae400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ae78c r4:8558ca80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b6c00 r8:8558caac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558ca80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558ca80 r8:80287e08 r7:eb72de60 r6:85656980 r5:855b6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f5fb0 to 0xeb7f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571680
INFO: task kworker/0:334:5193 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   98790000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:335:5196 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:335   state:D stack:0     pid:5196  tgid:5196  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:855b8c00
 r4:855b8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85571b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849aef8c r4:849aec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849aef8c r4:8558cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b8c00 r8:8558cb2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cb00 r8:80287e08 r7:eb72de60 r6:85656a00 r5:855b8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb801fb0 to 0xeb801ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571880
INFO: task kworker/0:335:5196 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   98828000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:00000000
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:336:5198 blocked for more than 464 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:336   state:D stack:0     pid:5198  tgid:5198  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb809d84 r8:00000002 r7:60000013 r6:eb809d8c r5:855b8000
 r4:855b8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb83d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d878c r4:849d8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d878c r4:8558cb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b8000 r8:8558cbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cb80 r8:80287e08 r7:eb801e60 r6:85656a80 r5:855b8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb809fb0 to 0xeb809ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571900
INFO: task kworker/0:336:5198 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   98828000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:849af38c r4:849af000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849af38c r4:8558cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855ba400 r8:8558cc2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cc00 r8:80287e08 r7:eb809e60 r6:85656b00 r5:855ba400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb80dfb0 to 0xeb80dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85571900
INFO: task kworker/0:337:5199 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:849af78c r4:849af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849af78c r4:8558cc80
 r10:61c88647 r9:855b9800 r8:8558ccac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
9d20:                   98ecc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:855bb000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08
 r9:83018005 r8:855bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
 r5:849afb8c r4:849af800
 r7:dddced80 r6:83018000 r5:849afb8c r4:8558cd00
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:340:5205 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:340   state:D stack:0     pid:5205  tgid:5205  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb835d84 r8:00000002 r7:60000013 r6:eb835d8c r5:855bd400
 r4:855bd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855bd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb821000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849aff8c r4:849afc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849aff8c r4:8558cd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855bd400 r8:8558cdac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cd80 r8:80287e08 r7:eb809e60 r6:85656c80 r5:855bd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:849d838c r4:849d8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9a13f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:342:5210 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:342   state:D stack:0     pid:5210  tgid:5210  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:855bec00
 r4:855bec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855bec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb855000
 r5:849d8f8c r4:849d8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d8f8c r4:8558ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
9d20:                   9a377000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb849000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d8b8c r4:849d8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d8b8c r4:8558cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84a24800 r8:8558cf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cf00 r8:80287e08 r7:eb859e60 r6:85656e00 r5:84a24800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb861fb0 to 0xeb861ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf1c0
INFO: task kworker/0:343:5212 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9a624000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:344:5214 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:344   state:D stack:0     pid:5214  tgid:5214  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:855bc800
 r4:855bc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855bc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfb00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0543000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d9f8c r4:849d9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d9f8c r4:8558cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855bc800 r8:8558cfac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8558cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8558cf80 r8:80287e08 r7:eb859e60 r6:85656e80 r5:855bc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb355fb0 to 0xeb355ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf1c0
INFO: task kworker/0:344:5214 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9a8b4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:345:5215 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:345   state:D stack:0     pid:5215  tgid:5215  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:855b1800
 r4:855b1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855b1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf6c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d938c r4:849d9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d938c r4:854ca000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855b1800 r8:854ca02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca000 r8:80287e08 r7:eb355e60 r6:85656f00 r5:855b1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4ddfb0 to 0xeb4ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf1c0
INFO: task kworker/0:345:5215 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9b196000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:346:5218 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:346   state:D stack:0     pid:5218  tgid:5218  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000013 r6:eb7a5d8c r5:855c1800
 r4:855c1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfae3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d978c r4:849d9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d978c r4:854ca080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c1800 r8:854ca0ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca080 r8:80287e08 r7:eb355e60 r6:85656f80 r5:855c1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a5fb0 to 0xeb7a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf500
INFO: task kworker/0:346:5218 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9b32a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:347:5220 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:347   state:D stack:0     pid:5220  tgid:5220  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:8563a400
 r4:8563a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bf980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dff0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849d9b8c r4:849d9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849d9b8c r4:854ca100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563a400 r8:854ca12c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca100 r8:80287e08 r7:eb355e60 r6:854ca180 r5:8563a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c9fb0 to 0xeb6c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf600
INFO: task kworker/0:347:5220 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9b6c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:348:5222 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:348   state:D stack:0     pid:5222  tgid:5222  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:8563e000
 r4:8563e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfbc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e06d9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849da38c r4:849da000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849da38c r4:854ca200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563e000 r8:854ca22c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca200 r8:80287e08 r7:eb355e60 r6:854ca280 r5:8563e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb79dfb0 to 0xeb79dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bfac0
INFO: task kworker/0:348:5222 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9b92a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:349:5223 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:349   state:D stack:0     pid:5223  tgid:5223  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:8563ec00
 r4:8563ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bfdc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0843000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849da78c r4:849da400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849da78c r4:854ca300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563ec00 r8:854ca32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca300 r8:80287e08 r7:eb79de60 r6:854ca380 r5:8563ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6ddfb0 to 0xeb6ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bfac0
INFO: task kworker/0:349:5223 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9bcf6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:350:5226 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:350   state:D stack:0     pid:5226  tgid:5226  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:8563d400
 r4:8563d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9200
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849db38c r4:849db000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849db38c r4:854ca400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563d400 r8:854ca42c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca400 r8:80287e08 r7:eb6dde60 r6:854ca480 r5:8563d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb875fb0 to 0xeb875ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bfc40
INFO: task kworker/0:350:5226 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9c1e1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:351:5228 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:351   state:D stack:0     pid:5228  tgid:5228  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb87dd84 r8:00000002 r7:60000113 r6:eb87dd8c r5:8563c800
 r4:8563c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8563c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bff00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8563c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dab8c r4:849da800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dab8c r4:854ca500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8563c800 r8:854ca52c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca500 r8:80287e08 r7:eb875e60 r6:854ca580 r5:8563c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb87dfb0 to 0xeb87dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bfd80
INFO: task kworker/0:351:5228 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9c420000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:352:5229 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:352   state:D stack:0     pid:5229  tgid:5229  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb885d84 r8:00000002 r7:60000013 r6:eb885d8c r5:855c2400
 r4:855c2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eadcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849daf8c r4:849dac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849daf8c r4:854ca600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c2400 r8:854ca62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca600 r8:80287e08 r7:eb875e60 r6:854a5000 r5:855c2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb885fb0 to 0xeb885ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bfd80
INFO: task kworker/0:352:5229 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9c420000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:353:5232 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:353   state:D stack:0     pid:5232  tgid:5232  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:855c3000
 r4:855c3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb105000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dbf8c r4:849dbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dbf8c r4:854ca700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c3000 r8:854ca72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca700 r8:80287e08 r7:eb875e60 r6:854a5080 r5:855c3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb88dfb0 to 0xeb88dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9280
INFO: task kworker/0:353:5232 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9c8dc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:354:5234 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:354   state:D stack:0     pid:5234  tgid:5234  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:855c0000
 r4:855c0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9100
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eafdd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849db78c r4:849db400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849db78c r4:854ca680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c0000 r8:854ca6ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca680 r8:80287e08 r7:eb88de60 r6:854a5100 r5:855c0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb895fb0 to 0xeb895ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9300
INFO: task kworker/0:354:5234 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9cb6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:355:5236 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:355   state:D stack:0     pid:5236  tgid:5236  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:855c3c00
 r4:855c3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dbb8c r4:849db800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dbb8c r4:854ca780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c3c00 r8:854ca7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca780 r8:80287e08 r7:eb88de60 r6:854a5180 r5:855c3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb89dfb0 to 0xeb89dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9180
INFO: task kworker/0:355:5236 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9cdb4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:356:5238 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:356   state:D stack:0     pid:5238  tgid:5238  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:855c4800
 r4:855c4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb503000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ddb8c r4:849dd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ddb8c r4:854ca800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c4800 r8:854ca82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca800 r8:80287e08 r7:eb88de60 r6:854a5200 r5:855c4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8a5fb0 to 0xeb8a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a93c0
INFO: task kworker/0:356:5238 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9d047000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:357:5240 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:357   state:D stack:0     pid:5240  tgid:5240  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:855c5400
 r4:855c5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a97c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dc38c r4:849dc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dc38c r4:854ca880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c5400 r8:854ca8ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca880 r8:80287e08 r7:eb8a5e60 r6:854a5280 r5:855c5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8adfb0 to 0xeb8adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9500
INFO: task kworker/0:357:5240 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9d20d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:358:5242 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:358   state:D stack:0     pid:5242  tgid:5242  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:855c6000
 r4:855c6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:849dc78c r4:849dc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:855c6000 r8:854ca92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854ca900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854ca900 r8:80287e08 r7:eb8a5e60 r6:854a5300 r5:855c6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8b5fb0 to 0xeb8b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9780
INFO: task kworker/0:358:5242 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9d3a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:359:5244 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:359   state:D stack:0     pid:5244  tgid:5244  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:855c6c00
 r4:855c6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:849dcb8c r4:849dc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dcb8c r4:854ca980
 r4:854ca980
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:360:5246 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:360   state:D stack:0     pid:5246  tgid:5246  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:855c0c00
 r4:855c0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:855c0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb37b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dcf8c r4:849dcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dcf8c r4:854caa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:855c0c00 r8:854caa2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854caa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854caa00 r8:80287e08 r7:eb8a5e60 r6:854a5400 r5:855c0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c5fb0 to 0xeb8c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:eaf29dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
INFO: task kworker/0:361:5248 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:361   state:D stack:0     pid:5248  tgid:5248  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:856f0c00
 r4:856f0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dd38c r4:849dd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dd38c r4:854caa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f0c00 r8:854caaac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854caa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854caa80 r8:80287e08 r7:eb8a5e60 r6:854a5480 r5:856f0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8cdfb0 to 0xeb8cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9940
INFO: task kworker/0:361:5248 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9db55000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:362:5250 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:362   state:D stack:0     pid:5250  tgid:5250  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000013 r6:eb8d5d8c r5:856f2400
 r4:856f2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dd78c r4:849dd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dd78c r4:854cab00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f2400 r8:854cab2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cab00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cab00 r8:80287e08 r7:eb8a5e60 r6:854a5500 r5:856f2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d5fb0 to 0xeb8d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a99c0
INFO: task kworker/0:362:5250 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9dcce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:363:5253 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:363   state:D stack:0     pid:5253  tgid:5253  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:856f3000
 r4:856f3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85652f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb51f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849ddf8c r4:849ddc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849ddf8c r4:854cab80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f3000 r8:854cabac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cab80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cab80 r8:80287e08 r7:eb8a5e60 r6:854a5580 r5:856f3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e1fb0 to 0xeb8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9dc0
INFO: task kworker/0:363:5253 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9e1ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:364:5255 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:364   state:D stack:0     pid:5255  tgid:5255  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8e9d84 r8:00000002 r7:60000113 r6:eb8e9d8c r5:856f4800
 r4:856f4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bffc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb55f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849de38c r4:849de000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849de38c r4:854cac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f4800 r8:854cac2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cac00 r8:80287e08 r7:eb8e1e60 r6:854a5600 r5:856f4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e9fb0 to 0xeb8e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf100
INFO: task kworker/0:364:5255 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9e1ae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:365:5257 blocked for more than 465 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:365   state:D stack:0     pid:5257  tgid:5257  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000013 r6:eb8f1d8c r5:856f3c00
 r4:856f3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854806c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849df78c r4:849df400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849df78c r4:854cac80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f3c00 r8:854cacac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cac80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cac80 r8:80287e08 r7:eb8e9e60 r6:854a5680 r5:856f3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f1fb0 to 0xeb8f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bf100
INFO: task kworker/0:365:5257 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9e588000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:366:5258 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:366   state:D stack:0     pid:5258  tgid:5258  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:856f1800
 r4:856f1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854800c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb573000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849de78c r4:849de400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849de78c r4:854cad00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f1800 r8:854cad2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cad00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cad00 r8:80287e08 r7:eb8f1e60 r6:854a5700 r5:856f1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f5fb0 to 0xeb8f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a9fc0
INFO: task kworker/0:366:5258 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9e8c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:367:5260 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:367   state:D stack:0     pid:5260  tgid:5260  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:856f5400
 r4:856f5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849deb8c r4:849de800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849deb8c r4:854cad80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f5400 r8:854cadac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cad80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cad80 r8:80287e08 r7:eb8f1e60 r6:854a5780 r5:856f5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8fdfb0 to 0xeb8fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480000
INFO: task kworker/0:367:5260 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9e8c9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:697:5262 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:697   state:D stack:0     pid:5262  tgid:5262  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:856f6c00
 r4:856f6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:856f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ead63000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a4f8c r4:856a4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a4f8c r4:854a5800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f6c00 r8:854a582c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854a5800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854a5800 r8:80287e08 r7:eb5c9e60 r6:854a5880 r5:856f6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f9fb0 to 0xeb8f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85499000
INFO: task kworker/1:697:5262 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9ee94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:368:5265 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:368   state:D stack:0     pid:5265  tgid:5265  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:856f6000
 r4:856f6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb75b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849def8c r4:849dec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849def8c r4:854cae00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f6000 r8:854cae2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cae00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cae00 r8:80287e08 r7:eb8f1e60 r6:854a5900 r5:856f6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb909fb0 to 0xeb909ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480500
INFO: task kworker/0:368:5265 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9ee94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:369:5266 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:369   state:D stack:0     pid:5266  tgid:5266  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:855be000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eb76f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849df38c r4:849df000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849df38c r4:854caf00
 r10:61c88647 r9:855be000 r8:854caf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:370:5268 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:370   state:D stack:0     pid:5268  tgid:5268  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb915d84 r8:00000002 r7:60000013 r6:eb915d8c r5:856f8c00
 r4:856f8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb931000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c038c r4:856c0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c038c r4:854cae80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f8c00 r8:854caeac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854cae80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854cae80 r8:80287e08 r7:eb8f1e60 r6:854a5a00 r5:856f8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb915fb0 to 0xeb915ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480600
INFO: task kworker/0:370:5268 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9f3d8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:371:5270 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:371   state:D stack:0     pid:5270  tgid:5270  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:856f8000
 r4:856f8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb869000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dfb8c r4:849df800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dfb8c r4:854caf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f8000 r8:854cafac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:854caf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854caf80 r8:80287e08 r7:eb915e60 r6:854a5a80 r5:856f8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb91dfb0 to 0xeb91dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480380
INFO: task kworker/0:371:5270 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9f3d8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:372:5273 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:372   state:D stack:0     pid:5273  tgid:5273  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb939d84 r8:00000002 r7:60000113 r6:eb939d8c r5:856f9800
 r4:856f9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb925000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:849dff8c r4:849dfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:849dff8c r4:85477000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f9800 r8:8547702c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477000 r8:80287e08 r7:eb915e60 r6:854a5b00 r5:856f9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb939fb0 to 0xeb939ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480740
INFO: task kworker/0:372:5273 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9f68d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:373:5276 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:373   state:D stack:0     pid:5276  tgid:5276  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb955d84 r8:00000002 r7:60000013 r6:eb955d8c r5:856fb000
 r4:856fb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb941000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c078c r4:856c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c078c r4:85477080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fb000 r8:854770ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477080 r8:80287e08 r7:eb915e60 r6:854a5b80 r5:856fb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb955fb0 to 0xeb955ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854807c0
INFO: task kworker/0:373:5276 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9f90c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:374:5277 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:374   state:D stack:0     pid:5277  tgid:5277  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:856fc800
 r4:856fc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb94d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c0b8c r4:856c0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c0b8c r4:85477100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fc800 r8:8547712c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477100 r8:80287e08 r7:eb955e60 r6:854a5c00 r5:856fc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb959fb0 to 0xeb959ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854807c0
INFO: task kworker/0:374:5277 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   9fba3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:375:5279 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:375   state:D stack:0     pid:5279  tgid:5279  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:856fa400
 r4:856fa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb961000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c0f8c r4:856c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c0f8c r4:85477180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fa400 r8:854771ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477180 r8:80287e08 r7:eb959e60 r6:854a5c80 r5:856fa400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb965fb0 to 0xeb965ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480b00
INFO: task kworker/0:375:5279 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a00b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:376:5281 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:376   state:D stack:0     pid:5281  tgid:5281  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:856fe000
 r4:856fe000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fe000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb96d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c138c r4:856c1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c138c r4:85477200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fe000 r8:8547722c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477200 r8:80287e08 r7:eb965e60 r6:854a5d00 r5:856fe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb975fb0 to 0xeb975ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480c80
INFO: task kworker/0:376:5281 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a00b2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:377:5282 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:377   state:D stack:0     pid:5282  tgid:5282  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb981d84 r8:00000002 r7:60000113 r6:eb981d8c r5:856fec00
 r4:856fec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556d680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c1b8c r4:856c1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c1b8c r4:85477280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fec00 r8:854772ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477280 r8:80287e08 r7:eb975e60 r6:854a5d80 r5:856fec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb981fb0 to 0xeb981ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480c80
INFO: task kworker/0:377:5282 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a0319000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:378:5284 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:378   state:D stack:0     pid:5284  tgid:5284  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:856fd400
 r4:856fd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856fd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c178c r4:856c1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c178c r4:85477300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856fd400 r8:8547732c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477300 r8:80287e08 r7:eb981e60 r6:854a5e00 r5:856fd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb991fb0 to 0xeb991ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85480e40
INFO: task kworker/0:378:5284 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a057f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:379:5287 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:379   state:D stack:0     pid:5287  tgid:5287  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:85700c00
 r4:85700c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85700c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c2f8c r4:856c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c2f8c r4:85477380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85700c00 r8:854773ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477380 r8:80287e08 r7:eb981e60 r6:854a5e80 r5:85700c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a5fb0 to 0xeb9a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556ddc0
INFO: task kworker/0:379:5287 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a057f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:380:5289 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:380   state:D stack:0     pid:5289  tgid:5289  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9b5d84 r8:00000002 r7:60000113 r6:eb9b5d8c r5:85700000
 r4:85700000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85700000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85700000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c1f8c r4:856c1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c1f8c r4:85477400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85700000 r8:8547742c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477400 r8:80287e08 r7:eb9a5e60 r6:854a5f00 r5:85700000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b5fb0 to 0xeb9b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:82ac21e4
 r4:eaf29dc0
 r4:00000000
 r5:00001000 r4:dfd17000
 r5:852bd78c r4:852bd400
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:381:5290 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:381   state:D stack:0     pid:5290  tgid:5290  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000113 r6:eb9c1d8c r5:85702400
 r4:85702400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85702400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461340
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85702400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c238c r4:856c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c238c r4:85477480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85702400 r8:854774ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477480 r8:80287e08 r7:eb9a5e60 r6:854a5f80 r5:85702400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c1fb0 to 0xeb9c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461000
INFO: task kworker/0:381:5290 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a0e5b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/0:382:5292 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:382   state:D stack:0     pid:5292  tgid:5292  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000013 r6:eb9d1d8c r5:85701800
 r4:85701800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85701800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85701800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c278c r4:856c2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c278c r4:85477500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85701800 r8:8547752c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477500 r8:80287e08 r7:eb9a5e60 r6:85331000 r5:85701800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d1fb0 to 0xeb9d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461240
INFO: task kworker/0:382:5292 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a10e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c2b8c r4:856c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c2b8c r4:85477580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85703c00 r8:854775ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477580 r8:80287e08 r7:eb9a5e60 r6:85331080 r5:85703c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d5fb0 to 0xeb9d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461240
INFO: task kworker/0:383:5294 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a10e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r4:eaf29dc0
 r5:00001000 r4:dfd17000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
      Not tainted 6.15.0-rc7-syzkaller #0
 r5:85704800 r4:8291a680
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb951fb0 to 0xeb951ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a1854000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:384:5299 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:85705400
 r5:85705400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854618c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85705400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c338c r4:856c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c338c r4:85477600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85705400 r8:8547762c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477600 r8:80287e08 r7:eb9a5e60 r6:85331200 r5:85705400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9f1fb0 to 0xeb9f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461540
INFO: task kworker/0:384:5299 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a1854000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:852cfa40
      Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:85706000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854baa00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb88f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573a38c r4:8573a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8573a38c r4:85477680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85706000 r8:854776ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477680 r8:80287e08 r7:eb9f1e60 r6:85331280 r5:85706000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9fdfb0 to 0xeb9fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854616c0
INFO: task kworker/0:385:5301 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a1b97000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:386:5303 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:386   state:D stack:0     pid:5303  tgid:5303  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:85706c00
 r4:85706c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85706c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85706c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfc01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c3b8c r4:856c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c3b8c r4:85477700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85706c00 r8:8547772c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477700 r8:80287e08 r7:eb9fde60 r6:85331300 r5:85706c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb721fb0 to 0xeb721ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854617c0
INFO: task kworker/0:386:5303 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a1db6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:387:5306 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:387   state:D stack:0     pid:5306  tgid:5306  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:856f0000
 r4:856f0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:856f0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:856f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c478c r4:856c4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c478c r4:85477780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:856f0000 r8:854777ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477780 r8:80287e08 r7:eb721e60 r6:85331380 r5:856f0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f1fb0 to 0xeb7f1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854613c0
INFO: task kworker/0:387:5306 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a1db6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
      Not tainted 6.15.0-rc7-syzkaller #0
 r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:856fbc00
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c3f8c r4:856c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c3f8c r4:85477800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r4:854613c0
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r4:00000000
9d20:                   a1fbe000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:389:5309 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:389   state:D stack:0     pid:5309  tgid:5309  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85709800
 r4:85709800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85709800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85709800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaeaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c438c r4:856c4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c438c r4:85477880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85709800 r8:854778ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477880
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:699:5312 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:699   state:D stack:0     pid:5312  tgid:5312  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:8570a400
 r4:8570a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8570a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8453d4c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb439000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a5f8c r4:856a5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a5f8c r4:85331500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8570a400 r8:8533152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:390:5314 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:390   state:D stack:0     pid:5314  tgid:5314  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:8570b000
 r4:8570b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8570b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477900 r8:80287e08 r7:eb7f1e60 r6:85331600 r5:8570b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb84dfb0 to 0xeb84dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461c40
INFO: task kworker/0:390:5314 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a2721000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:700:5315 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336b00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a578c r4:856a5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeba09fb0 to 0xeba09ff8)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:391:5316 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:391   state:D stack:0     pid:5316  tgid:5316  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:8570bc00
 r4:8570bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8570bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb18d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a5b8c r4:856a5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856a5b8c r4:85477980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8570bc00 r8:854779ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477980 r8:80287e08 r7:eb7f1e60 r6:85331780 r5:8570bc00
Workqueue: events bpf_prog_free_deferred
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:701:5319 blocked for more than 466 seconds.
 r4:8570d400
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c538c r4:856c5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:00000001
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a2e9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:392:5322 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:392   state:D stack:0     pid:5322  tgid:5322  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:8570ec00
 r4:8570ec00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c678c r4:856c6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85477a00 r8:80287e08 r7:eb7f1e60 r6:85331900 r5:8570ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba1dfb0 to 0xeba1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461e40
INFO: task kworker/0:392:5322 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a30be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:393:5323 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:393   state:D stack:0     pid:5323  tgid:5323  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba21d84 r8:00000002 r7:60000113 r6:eba21d8c r5:85708c00
 r4:85708c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85708c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854612c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85708c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb279000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c4b8c r4:856c4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c4b8c r4:85477a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85708c00 r8:85477aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477a80 r8:80287e08 r7:eba1de60 r6:85331980 r5:85708c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba21fb0 to 0xeba21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461d80
INFO: task kworker/0:393:5323 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a338d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:394:5324 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:394   state:D stack:0     pid:5324  tgid:5324  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:846b3000
 r4:846b3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532d0c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:846b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c4f8c r4:856c4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c4f8c r4:85477b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b3000 r8:85477b2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477b00 r8:80287e08 r7:eba1de60 r6:85477b80 r5:846b3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b1fb0 to 0xeb9b1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85461f80
INFO: task kworker/0:394:5324 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a338d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:702:5328 blocked for more than 466 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:702   state:D stack:0     pid:5328  tgid:5328  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:846b3c00
 r4:846b3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853210c0
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a638c r4:856a6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:85331a00
Exception stack(0xeba25fb0 to 0xeba25ff8)
 r4:85336a80
Call trace: 
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a3794000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:395:5330 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:395   state:D stack:0     pid:5330  tgid:5330  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba29d84 r8:00000002 r7:60000113 r6:eba29d8c r5:846b4800
 r4:846b4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532d400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:846b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c578c r4:856c5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c578c r4:85477c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b4800 r8:85477cac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477c80 r8:80287e08 r7:eba1de60 r6:85477d00 r5:846b4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba29fb0 to 0xeba29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8532d200
INFO: task kworker/0:395:5330 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a3bf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:396:5331 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:396   state:D stack:0     pid:5331  tgid:5331  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:846b5400
 r4:846b5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85479180
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:846b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb847000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c5b8c r4:856c5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c5b8c r4:85477d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b5400 r8:85477dac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85477d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85477d80 r8:80287e08 r7:eba1de60 r6:85477e00 r5:846b5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb879fb0 to 0xeb879ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8532d200
INFO: task kworker/0:396:5331 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a3f61000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321280
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a678c r4:856a6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a678c r4:85331a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b6000 r8:85331aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331a80 r8:80287e08 r7:eba25e60 r6:85477e80 r5:846b6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba31fb0 to 0xeba31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:853366c0
INFO: task kworker/1:703:5333 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a42be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:704   state:D stack:0     pid:5336  tgid:5336  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:00001000 r4:eb603000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a738c r4:856a7000
 r7:ddde2d80 r6:83018200 r5:856a738c r4:85331b00
 r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r5:80070113 r4:80239bb0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:846b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb485000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a6b8c r4:856a6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a6b8c r4:85331b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b6c00 r8:85331bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331b80 r8:80287e08 r7:eba3de60 r6:85477f80 r5:846b6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba41fb0 to 0xeba41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321100
INFO: task kworker/1:705:5337 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a46cc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:706:5339 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:706   state:D stack:0     pid:5339  tgid:5339  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba49d84 r8:00000002 r7:60000013 r6:eba49d8c r5:846b2400
 r4:846b2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a6f8c r4:856a6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a6f8c r4:85331c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b2400 r8:85331c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331c00 r8:80287e08 r7:eba3de60 r6:8532f000 r5:846b2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba49fb0 to 0xeba49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321200
INFO: task kworker/1:706:5339 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a4816000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
task:kworker/1:707   state:D stack:0     pid:5341  tgid:5341  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a778c r4:856a7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a778c r4:85331c80
 r4:85331c80
Exception stack(0xeba51fb0 to 0xeba51ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb669000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a7b8c r4:856a7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856a7b8c r4:85331d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84788c00 r8:85331d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331d00 r8:80287e08 r7:eba51e60 r6:8532f100 r5:84788c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba59fb0 to 0xeba59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321500
INFO: task kworker/1:708:5343 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a4c62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:709:5345 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:709   state:D stack:0     pid:5345  tgid:5345  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:84788000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08
 r5:00001000 r4:eb693000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856a7f8c r4:856a7c00
 r10:61c88647 r9:84788000 r8:85331dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:710   state:D stack:0     pid:5347  tgid:5347  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:84789800
 r4:84789800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84789800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84789800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b038c r4:856b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b038c r4:85331e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84789800 r8:85331e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331e00 r8:80287e08 r7:eba61e60 r6:8532f200 r5:84789800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba69fb0 to 0xeba69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321780
INFO: task kworker/1:710:5347 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a502d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:711:5349 blocked for more than 467 seconds.
 r4:8478bc00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08
 r5:00001000 r4:eb6b5000
 r5:8444a38c r4:8444a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:85331e80 r8:80287e08 r7:eba69e60 r6:8532f280 r5:8478bc00
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321900
INFO: task kworker/1:711:5349 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a5779000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854670c0
 r5:856b138c r4:856b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8478b000 r8:85331f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:713:5353 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:713   state:D stack:0     pid:5353  tgid:5353  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:8478a400
 r4:8478a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8478a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b078c r4:856b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b078c r4:85331f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478a400 r8:85331fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85331f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85331f80 r8:80287e08 r7:eba79e60 r6:8532f380 r5:8478a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba81fb0 to 0xeba81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85321b40
INFO: task kworker/1:713:5353 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a586c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:714:5355 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:714   state:D stack:0     pid:5355  tgid:5355  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba89d84 r8:00000002 r7:60000113 r6:eba89d8c r5:8478c800
 r4:8478c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8478c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:856b0b8c r4:856b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8533e000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r5:8570c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336e40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b0f8c r4:856b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b0f8c r4:8533e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8570c800 r8:8533e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e080 r8:80287e08 r7:eba79e60 r6:8533e100 r5:8570c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba2dfb0 to 0xeba2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85336a40
INFO: task kworker/1:715:5357 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a5d1c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
 r4:8570e000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08
 r5:00001000 r4:eb81d000
 r5:856b178c r4:856b1400
 r7:ddde2d80 r6:83018200 r5:856b178c r4:8533e180
Exception stack(0xeba8dfb0 to 0xeba8dff8)
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a6038000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:717:5362 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:717   state:D stack:0     pid:5362  tgid:5362  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:85710000
 r4:85710000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85710000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b1b8c r4:856b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b1b8c r4:8533e280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85710000 r8:8533e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e280 r8:80287e08 r7:eba8de60 r6:8533e300 r5:85710000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba95fb0 to 0xeba95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85467180
INFO: task kworker/1:717:5362 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a6249000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:718:5364 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:718   state:D stack:0     pid:5364  tgid:5364  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:85710c00
 r4:85710c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85710c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854678c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b238c r4:856b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b238c r4:8533e380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85710c00 r8:8533e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e380 r8:80287e08 r7:eba95e60 r6:8533e400 r5:85710c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba35fb0 to 0xeba35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:eaf29dc0
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
9fa0:                                     00000000 00000000 00000000 00000000
 r4:85712400
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb863000
 r5:856b1f8c r4:856b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b1f8c r4:8533e480
 r10:61c88647 r9:85712400 r8:8533e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeba9dfb0 to 0xeba9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85467380
INFO: task kworker/1:719:5366 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a6778000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:720:5370 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:720   state:D stack:0     pid:5370  tgid:5370  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:85713000
 r4:85713000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85713000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854679c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85713000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b278c r4:856b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b278c r4:8533e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85713000 r8:8533e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e580 r8:80287e08 r7:eba35e60 r6:8533e600 r5:85713000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba99fb0 to 0xeba99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85467700
INFO: task kworker/1:720:5370 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a67ce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:721   state:D stack:0     pid:5371  tgid:5371  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:85713c00
 r4:85713c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85713c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85713c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebab7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b2b8c r4:856b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b2b8c r4:8533e680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85713c00 r8:8533e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e680 r8:80287e08 r7:eba99e60 r6:8533e700 r5:85713c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba91fb0 to 0xeba91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854677c0
INFO: task kworker/1:721:5371 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a6b19000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:722:5373 blocked for more than 467 seconds.
 r5:85714800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebacf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856b338c r4:856b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b338c r4:8533e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85714800 r8:8533e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e780 r8:80287e08 r7:eba91e60 r6:8533e800 r5:85714800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab5fb0 to 0xebab5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85467ac0
INFO: task kworker/1:722:5373 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a6df8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:723:5375 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:723   state:D stack:0     pid:5375  tgid:5375  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:85715400
 r4:85715400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85715400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85715400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebac3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:856b2f8c r4:856b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b2f8c r4:8533e880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85715400 r8:8533e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533e880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533e880 r8:80287e08 r7:ebab5e60 r6:8533e900 r5:85715400
 r4:00000001
1fa0:                                     00000000 00000000 00000000 00000000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a71f3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:397:5376 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:397   state:D stack:0     pid:5376  tgid:5376  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaa9d84 r8:00000002 r7:60000113 r6:ebaa9d8c r5:85716000
 r4:85716000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85716000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555e440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c638c r4:856c6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c638c r4:8532f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85716000 r8:8532f4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532f480 r8:80287e08 r7:eba1de60 r6:8533e980 r5:85716000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa9fb0 to 0xebaa9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85479440
INFO: task kworker/0:397:5376 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a7486000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:724:5379 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:724   state:D stack:0     pid:5379  tgid:5379  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:85716c00
 r4:85716c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:856b378c r4:856b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b378c r4:8533ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85716c00 r8:8533ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533ea00 r8:80287e08 r7:ebab5e60 r6:8533ea80 r5:85716c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebacdfb0 to 0xebacdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85467d80
INFO: task kworker/1:724:5379 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a7486000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r5:85711800 r4:8291a680
 r4:00000000
 r4:00000000
 r5:856b3f8c r4:856b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b3f8c r4:8533eb00
 r10:61c88647 r9:85711800 r8:8533eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a7c1b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08
 r5:856b3b8c r4:856b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856b3b8c r4:8533ec00
 r10:61c88647 r9:85703000 r8:8533ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533ec00 r8:80287e08 r7:ebad9e60 r6:8533ec80 r5:85703000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae5fb0 to 0xebae5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8532da40
INFO: task kworker/1:726:5382 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a7fb8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:727:5384 blocked for more than 467 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:727   state:D stack:0     pid:5384  tgid:5384  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:85718000
 r4:85718000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85718000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572c38c r4:8572c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572c38c r4:8533ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85718000 r8:8533ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8533ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8533ed00 r8:80287e08 r7:ebad9e60 r6:8533ed80 r5:85718000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf1fb0 to 0xebaf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85482040
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:00001000 r4:dfd17000
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Call trace: 
 r4:00000000
 r5:8572cb8c r4:8572c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r10:8291a684 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:85719800
 r5:00001000 r4:dfa77000
 r5:8572c78c r4:8572c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8572cf8c r4:8572cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572cf8c r4:85498000
 r10:00000000 r9:85498000 r8:80287e08 r7:ebafde60 r6:85498080 r5:8571a400
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a884a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:731:5391 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:731   state:D stack:0     pid:5391  tgid:5391  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:8571b000
 r4:8571b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8571b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8571b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0657000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572d38c r4:8572d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572d38c r4:85498100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8571b000 r8:8549812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:732:5394 blocked for more than 468 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8572d78c r4:8572d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572d78c r4:85498200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:85498200 r8:80287e08 r7:eb8a1e60 r6:85498280 r5:8571bc00
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:8572db8c r4:8572d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572db8c r4:85498300
 r4:85498300
Exception stack(0xeb8d9fb0 to 0xeb8d9ff8)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r5:00001000 r4:dfd17000
 r4:8530ac00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572e38c r4:8572e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572e38c r4:85498400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8571d400 r8:8549842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498400 r8:80287e08 r7:eb8d9e60 r6:85498480 r5:8571d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e5fb0 to 0xeb8e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85482b00
INFO: task kworker/1:734:5398 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a9568000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:735   state:D stack:0     pid:5399  tgid:5399  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacd1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572df8c r4:8572dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572df8c r4:85498500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8571e000 r8:8549852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498500 r8:80287e08 r7:eb8e5e60 r6:85498580 r5:8571e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d1fb0 to 0xeb8d1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85482b00
INFO: task kworker/1:735:5399 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a9aeb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace: 
 r5:8571ec00 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a45c0
 r5:8572ef8c r4:8572ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572ef8c r4:85498600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8571ec00 r8:8549862c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498600 r8:80287e08 r7:eb8e5e60 r6:85498680 r5:8571ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb901fb0 to 0xeb901ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85482e00
INFO: task kworker/1:736:5402 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   a9ed4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:737:5403 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:737   state:D stack:0     pid:5403  tgid:5403  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:85720000
 r4:85720000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85720000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85720000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572e78c r4:8572e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572e78c r4:85498700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85720000 r8:8549872c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498700 r8:80287e08 r7:eb901e60 r6:85498780 r5:85720000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb92dfb0 to 0xeb92dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4080
INFO: task kworker/1:737:5403 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   aa727000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:738:5405 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:738   state:D stack:0     pid:5405  tgid:5405  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85721800
 r4:85721800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85721800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4480
 r9:83018205 r8:85721800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572eb8c r4:8572e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572eb8c r4:85498800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85721800 r8:8549882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498800 r8:80287e08 r7:eb901e60 r6:85498880 r5:85721800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb93dfb0 to 0xeb93dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4080
INFO: task kworker/1:738:5405 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   aa727000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:739:5408 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:739   state:D stack:0     pid:5408  tgid:5408  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:85722400
 r4:85722400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85722400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4780
 r9:83018205 r8:85722400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb33f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572f38c r4:8572f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572f38c r4:85498900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85722400 r8:8549892c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498900 r8:80287e08 r7:eb901e60 r6:85498980 r5:85722400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb945fb0 to 0xeb945ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4180
INFO: task kworker/1:739:5408 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   aaca8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:740:5410 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:740   state:D stack:0     pid:5410  tgid:5410  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb929d84 r8:00000002 r7:60000113 r6:eb929d8c r5:85720c00
 r4:85720c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85720c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85720c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb36f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572f78c r4:8572f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572f78c r4:85498a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85720c00 r8:85498a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498a00 r8:80287e08 r7:eb945e60 r6:85498a80 r5:85720c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb929fb0 to 0xeb929ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4600
INFO: task kworker/1:740:5410 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ab222000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:741:5413 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:741   state:D stack:0     pid:5413  tgid:5413  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:85723c00
 r4:85723c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85723c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572ff8c r4:8572fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572ff8c r4:85498b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85723c00 r8:85498b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498b00 r8:80287e08 r7:eb929e60 r6:85498b80 r5:85723c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb971fb0 to 0xeb971ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4680
INFO: task kworker/1:741:5413 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ab5e2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:742:5414 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:742   state:D stack:0     pid:5414  tgid:5414  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:85724800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85724800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8572fb8c r4:8572f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8572fb8c r4:85498c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85724800 r8:85498c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498c00 r8:80287e08 r7:eb971e60 r6:85498c80 r5:85724800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb985fb0 to 0xeb985ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4680
INFO: task kworker/1:742:5414 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ab5e2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:743:5416 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:743   state:D stack:0     pid:5416  tgid:5416  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:85725400 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4d40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573838c r4:85738000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85725400 r8:85498d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498d00 r8:80287e08 r7:eb971e60 r6:85498d80 r5:85725400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb995fb0 to 0xeb995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4a40
INFO: task kworker/1:743:5416 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   abb2f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:744:5418 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:744   state:D stack:0     pid:5418  tgid:5418  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85726000
 r4:85726000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85726000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85482f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85726000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb579000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85738b8c r4:85738800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85738b8c r4:85498e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85726000 r8:85498e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498e00 r8:80287e08 r7:eb995e60 r6:85498e80 r5:85726000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c5fb0 to 0xeb9c5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4c00
INFO: task kworker/1:744:5418 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   abdba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:745:5419 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:745   state:D stack:0     pid:5419  tgid:5419  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:85726c00
 r4:85726c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85726c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a4e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb547000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573878c r4:85738400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573878c r4:85498f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85726c00 r8:85498f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85498f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85498f00 r8:80287e08 r7:eb9c5e60 r6:85498f80 r5:85726c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb0dfb0 to 0xebb0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4c00
INFO: task kworker/1:745:5419 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ac025000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:746:5421 blocked for more than 468 seconds.
 r5:85723000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8573938c r4:85739000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573938c r4:854bd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85723000 r8:854bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd000 r8:80287e08 r7:eb9c5e60 r6:854bd080 r5:85723000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb11fb0 to 0xebb11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854a4d00
INFO: task kworker/1:746:5421 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ac467000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:747:5424 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:747   state:D stack:0     pid:5424  tgid:5424  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:85768000
 r4:85768000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:85738f8c r4:85738c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85738f8c r4:854bd100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:854bd100 r8:80287e08 r7:ebb11e60 r6:854bd180 r5:85768000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ac584000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:85739b8c r4:85739800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85739b8c r4:854bd200
 r10:00000000 r9:854bd200 r8:80287e08 r7:ebb11e60 r6:854bd280 r5:85768c00
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:749:5427 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:749   state:D stack:0     pid:5427  tgid:5427  ppid:2      task_flags:0x4208060 flags:0x00000000
 r5:85769800 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8573978c r4:85739400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573978c r4:854bd300
 r4:854bd300
Exception stack(0xebb1dfb0 to 0xebb1dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba100
INFO: task kworker/1:749:5427 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   acbe1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba8c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb87f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85739f8c r4:85739c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85739f8c r4:854bd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576a400 r8:854bd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd400 r8:80287e08 r7:ebb19e60 r6:8532f500 r5:8576a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb21fb0 to 0xebb21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba540
INFO: task kworker/1:750:5429 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   accf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb29d84 r8:00000002 r7:60000013 r6:ebb29d8c r5:8478ec00
 r4:8478ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8478ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb85b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c5f8c r4:856c5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856c5f8c r4:854bd480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478ec00 r8:854bd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd480 r8:80287e08 r7:ebb21e60 r6:8532f580 r5:8478ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb29fb0 to 0xebb29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba6c0
INFO: task kworker/1:751:5432 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   accf3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bafc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8478e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb903000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573b38c r4:8573b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573b38c r4:854bd500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478e000 r8:854bd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd500 r8:80287e08 r7:ebb21e60 r6:8532f600 r5:8478e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb31fb0 to 0xebb31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba740
INFO: task kworker/1:752:5434 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ad3b1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:753:5437 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:753   state:D stack:0     pid:5437  tgid:5437  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000113 r6:ebb35d8c r5:846b0000
 r4:846b0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:846b0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb8a7000
 r5:8573a78c r4:8573a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573a78c r4:854bd580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:846b0000 r8:854bd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd580
 r10:00000000 r9:854bd580 r8:80287e08 r7:ebb31e60 r6:8532f680 r5:846b0000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:754:5439 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:754   state:D stack:0     pid:5439  tgid:5439  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb3dd84 r8:00000002 r7:60000113 r6:ebb3dd8c r5:84ae0c00
 r4:84ae0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bad40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573ab8c r4:8573a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573ab8c r4:854bd600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae0c00 r8:854bd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd600 r8:80287e08 r7:ebb31e60 r6:8532f700 r5:84ae0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb3dfb0 to 0xebb3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba9c0
INFO: task kworker/1:754:5439 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ad773000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:755:5440 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:755   state:D stack:0     pid:5440  tgid:5440  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb25d84 r8:00000002 r7:60000113 r6:ebb25d8c r5:8576b000
 r4:8576b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8576b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854bae40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573af8c r4:8573ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573af8c r4:854bd680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576b000 r8:854bd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd680 r8:80287e08 r7:ebb31e60 r6:854bd700 r5:8576b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb25fb0 to 0xebb25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854bad80
INFO: task kworker/1:755:5440 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ad773000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:756:5443 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:756   state:D stack:0     pid:5443  tgid:5443  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:8576c800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e0c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb923000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573bb8c r4:8573b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573bb8c r4:854bd780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576c800 r8:854bd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd780 r8:80287e08 r7:ebb31e60 r6:854bd800 r5:8576c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb39fb0 to 0xebb39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854badc0
INFO: task kworker/1:756:5443 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae088000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:757:5444 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:757   state:D stack:0     pid:5444  tgid:5444  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb2dd84 r8:00000002 r7:60000113 r6:ebb2dd8c r5:8576d400
 r4:8576d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8576d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ba580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb917000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573b78c r4:8573b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573b78c r4:854bd880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576d400 r8:854bd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd880 r8:80287e08 r7:ebb39e60 r6:854bd900 r5:8576d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb2dfb0 to 0xebb2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:854ba940
INFO: task kworker/1:757:5444 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae2e6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:758:5447 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:758   state:D stack:0     pid:5447  tgid:5447  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:8576e000
 r4:8576e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8576e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb95b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574038c r4:85740000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574038c r4:854bd980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576e000 r8:854bd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bd980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bd980 r8:80287e08 r7:ebb39e60 r6:854bda00 r5:8576e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb45fb0 to 0xebb45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e000
INFO: task kworker/1:758:5447 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae3cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:759:5449 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:759   state:D stack:0     pid:5449  tgid:5449  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb4dd84 r8:00000002 r7:60000113 r6:ebb4dd8c r5:8576ec00
 r4:8576ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8576ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb93f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8573bf8c r4:8573bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8573bf8c r4:854bda80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576ec00 r8:854bdaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bda80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bda80 r8:80287e08 r7:ebb45e60 r6:854bdb00 r5:8576ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb4dfb0 to 0xebb4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e180
INFO: task kworker/1:759:5449 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae932000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:760:5450 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:760   state:D stack:0     pid:5450  tgid:5450  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:8576bc00
 r4:8576bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8576bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8576bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574078c r4:85740400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574078c r4:854bdb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8576bc00 r8:854bdbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bdb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bdb80 r8:80287e08 r7:ebb45e60 r6:854bdc00 r5:8576bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb51fb0 to 0xebb51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e3c0
INFO: task kworker/1:760:5450 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae932000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:761:5454 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:761   state:D stack:0     pid:5454  tgid:5454  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb55d84 r8:00000002 r7:60000013 r6:ebb55d8c r5:85770000
 r4:85770000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85770000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85770000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb97b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85740b8c r4:85740800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85740b8c r4:854bdc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85770000 r8:854bdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bdc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bdc80 r8:80287e08 r7:ebb51e60 r6:854bdd00 r5:85770000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb55fb0 to 0xebb55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e4c0
INFO: task kworker/1:761:5454 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ae9df000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:762:5455 blocked for more than 468 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:762   state:D stack:0     pid:5455  tgid:5455  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:85770c00
 r4:85770c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85770c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85740f8c r4:85740c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85740f8c r4:854bdd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85770c00 r8:854bddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bdd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bdd80 r8:80287e08 r7:ebb55e60 r6:854bde00 r5:85770c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb59fb0 to 0xebb59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e7c0
INFO: task kworker/1:762:5455 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   af3a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:763:5457 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:763   state:D stack:0     pid:5457  tgid:5457  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:85771800
 r4:85771800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85771800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ea40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85771800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574138c r4:85741000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574138c r4:854bde80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85771800 r8:854bdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bde80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bde80 r8:80287e08 r7:ebb59e60 r6:854bdf00 r5:85771800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb5dfb0 to 0xebb5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e540
INFO: task kworker/1:763:5457 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   af3a5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:764:5458 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:764   state:D stack:0     pid:5458  tgid:5458  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:85772400
 r4:85772400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85772400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ec40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85772400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574178c r4:85741400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574178c r4:854bdf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85772400 r8:854bdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:854bdf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:854bdf80 r8:80287e08 r7:ebb5de60 r6:8557c000 r5:85772400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb49fb0 to 0xebb49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556e540
INFO: task kworker/1:764:5458 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   af709000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:765:5461 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:765   state:D stack:0     pid:5461  tgid:5461  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb61d84 r8:00000002 r7:60000013 r6:ebb61d8c r5:85773000
 r4:85773000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85773000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856070c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574278c r4:85742400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574278c r4:8557c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85773000 r8:8557c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c080 r8:80287e08 r7:ebb49e60 r6:8557c100 r5:85773000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb61fb0 to 0xebb61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556eac0
INFO: task kworker/1:765:5461 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   afbb5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:766:5463 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:766   state:D stack:0     pid:5463  tgid:5463  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:85773c00
 r4:85773c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85773c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556edc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85741b8c r4:85741800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85741b8c r4:8557c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85773c00 r8:8557c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c180 r8:80287e08 r7:ebb61e60 r6:8557c200 r5:85773c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb69fb0 to 0xebb69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556ebc0
INFO: task kworker/1:766:5463 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   aff5d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:767:5464 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:767   state:D stack:0     pid:5464  tgid:5464  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:85774800
 r4:85774800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85774800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556eec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85741f8c r4:85741c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85741f8c r4:8557c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85774800 r8:8557c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c280 r8:80287e08 r7:ebb61e60 r6:8557c300 r5:85774800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb6dfb0 to 0xebb6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556ebc0
INFO: task kworker/1:767:5464 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   aff5d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:768:5466 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:768   state:D stack:0     pid:5466  tgid:5466  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000113 r6:ebb75d8c r5:84ae2400
 r4:84ae2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85321fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574238c r4:85742000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574238c r4:8557c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae2400 r8:8557c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c380 r8:80287e08 r7:ebb61e60 r6:8532f780 r5:84ae2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb75fb0 to 0xebb75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556ebc0
INFO: task kworker/1:768:5466 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b031e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ebb81d84 r8:00000002 r7:60000013 r6:ebb81d8c r5:84ae3000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856072c0
 r5:85743f8c r4:85743c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85743f8c r4:8557c400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae3000 r8:8557c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c400 r8:80287e08 r7:ebb61e60 r6:8532f800 r5:84ae3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb81fb0 to 0xebb81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85607000
INFO: task kworker/1:769:5469 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b0567000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:770:5470 blocked for more than 469 seconds.
task:kworker/1:770   state:D stack:0     pid:5470  tgid:5470  ppid:2      task_flags:0x4208060 flags:0x00000000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85742b8c r4:85742800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85742b8c r4:8557c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae1800 r8:8557c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c480 r8:80287e08 r7:ebb81e60 r6:8532f880 r5:84ae1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb8dfb0 to 0xebb8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85607000
INFO: task kworker/1:770:5470 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b0567000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:84ae0000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08
 r9:83018205 r8:84ae0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
 r5:85742f8c r4:85742c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85742f8c r4:8557c500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae0000 r8:8557c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c500 r8:80287e08 r7:ebb81e60 r6:8532f900 r5:84ae0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb95fb0 to 0xebb95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85607180
INFO: task kworker/1:771:5472 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b0cb9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8574338c r4:85743000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574338c r4:8557c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85775400 r8:8557c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557c580 r8:80287e08 r7:ebb81e60 r6:8557c600 r5:85775400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb65fb0 to 0xebb65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85607380
INFO: task kworker/1:772:5475 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:398:5477 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:398   state:D stack:0     pid:5477  tgid:5477  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85778000
 r4:85778000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85778000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555ed80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85778000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c6b8c r4:856c6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c6b8c r4:8532f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85778000 r8:8532f9ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532f980 r8:80287e08 r7:eba1de60 r6:8557c680 r5:85778000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbb5fb0 to 0xebbb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555e600
INFO: task kworker/0:398:5477 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:399:5478 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:399   state:D stack:0     pid:5478  tgid:5478  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000013 r6:ebbc5d8c r5:85779800
 r4:85779800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85779800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856484c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaad1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c7b8c r4:856c7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c7b8c r4:8532fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85779800 r8:8532fa2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fa00 r8:80287e08 r7:ebbb5e60 r6:8557c700 r5:85779800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc5fb0 to 0xebbc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555e040
INFO: task kworker/0:399:5478 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
task:kworker/0:400   state:D stack:0     pid:5480  tgid:5480  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8577a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c6f8c r4:856c6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c6f8c r4:8532fa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8577a400 r8:8532faac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fa80 r8:80287e08 r7:ebbc5e60 r6:8557c780 r5:8577a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc9fb0 to 0xebbc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8555e040
INFO: task kworker/0:400:5480 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b12f7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
 r4:85778c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r9:83018005 r8:85778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
 r5:856c778c r4:856c7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c778c r4:8532fb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85778c00 r8:8532fb2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fb00 r8:80287e08 r7:ebbc5e60 r6:8557c800 r5:85778c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba15fb0 to 0xeba15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85648080
INFO: task kworker/0:401:5481 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:8577c800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8577c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d8b8c r4:856d8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d8b8c r4:8532fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8577c800 r8:8532fbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fb80 r8:80287e08 r7:ebbc5e60 r6:8557c880 r5:8577c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebabdfb0 to 0xebabdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85648240
INFO: task kworker/0:402:5486 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:403:5487 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:403   state:D stack:0     pid:5487  tgid:5487  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:8577b000
 r4:8577b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8577b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:856c7f8c r4:856c7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c7f8c r4:8532fc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:8532fc00 r8:80287e08 r7:ebabde60 r6:8557c900 r5:8577b000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b1edf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:8577e000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:84b6978c r4:84b69400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8577e000 r8:8532fcac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fc80 r8:80287e08 r7:ebabde60 r6:8557c980 r5:8577e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae1fb0 to 0xebae1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85648440
INFO: task kworker/0:404:5489 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b29d4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:773:5492 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:773   state:D stack:0     pid:5492  tgid:5492  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebad5d84 r8:00000002 r7:60000013 r6:ebad5d8c r5:8577bc00
 r4:8577bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8577bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856078c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8577bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb009000
 r5:8574378c r4:85743400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574378c r4:8557ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:8557ca00
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:82ac21e4
 r4:eaf29dc0
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:774:5494 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:774   state:D stack:0     pid:5494  tgid:5494  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaedd84 r8:00000002 r7:60000013 r6:ebaedd8c r5:8577ec00
 r4:8577ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8577ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607700
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8577ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb1f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85743b8c r4:85743800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85743b8c r4:8557cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8577ec00 r8:8557cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557cb00 r8:80287e08 r7:ebb81e60 r6:8557cb80 r5:8577ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaedfb0 to 0xebaedff8)
dfa0:                                     00000000 00000000 00000000 00000000
 r4:85607880
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r5:80070113 r4:80239bb0
 r4:eaf29dc0
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:775:5495 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:775   state:D stack:0     pid:5495  tgid:5495  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000113 r6:ebb71d8c r5:8577d400
 r4:8577d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8577d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8577d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574c78c r4:8574c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574c78c r4:8557cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8577d400 r8:8557cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557cc00 r8:80287e08 r7:ebb81e60 r6:8557cc80 r5:8577d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb71fb0 to 0xebb71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85607880
INFO: task kworker/1:775:5495 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:776:5497 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:776   state:D stack:0     pid:5497  tgid:5497  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:85776c00
 r4:85776c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85776c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb39e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574c38c r4:8574c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574c38c r4:8557cd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85776c00 r8:8557cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557cd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557cd00 r8:80287e08 r7:ebb71e60 r6:8557cd80 r5:85776c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb05fb0 to 0xebb05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640080
INFO: task kworker/1:776:5497 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b376e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:777:5500 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:777   state:D stack:0     pid:5500  tgid:5500  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:85776000
 r4:85776000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85776000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85776000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb447000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574cb8c r4:8574c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574cb8c r4:8557ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85776000 r8:8557ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557ce00 r8:80287e08 r7:ebb71e60 r6:8557ce80 r5:85776000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf9fb0 to 0xebaf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856402c0
INFO: task kworker/1:777:5500 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b376e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:778:5503 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:778   state:D stack:0     pid:5503  tgid:5503  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85780000
 r4:85780000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85780000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb477000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574cf8c r4:8574cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574cf8c r4:8557cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85780000 r8:8557cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8557cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8557cf00 r8:80287e08 r7:ebaf9e60 r6:8557cf80 r5:85780000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbddfb0 to 0xebbddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640300
INFO: task kworker/1:778:5503 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b3a90000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:779:5505 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:779   state:D stack:0     pid:5505  tgid:5505  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85780c00
 r4:85780c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85780c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574d38c r4:8574d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574d38c r4:8564f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85780c00 r8:8564f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f000 r8:80287e08 r7:ebbdde60 r6:8564f080 r5:85780c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe1fb0 to 0xebbe1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856405c0
INFO: task kworker/1:779:5505 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b3cdf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:780:5507 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:780   state:D stack:0     pid:5507  tgid:5507  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:85781800
 r4:85781800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85781800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85781800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574d78c r4:8574d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574d78c r4:8564f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85781800 r8:8564f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f100 r8:80287e08 r7:ebbe1e60 r6:8564f180 r5:85781800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe5fb0 to 0xebbe5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640600
INFO: task kworker/1:780:5507 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b433a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:405:5509 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:405   state:D stack:0     pid:5509  tgid:5509  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000113 r6:ebbe9d8c r5:85782400
 r4:85782400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85782400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85782400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856c378c r4:856c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856c378c r4:8532fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85782400 r8:8532fd2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fd00 r8:80287e08 r7:ebabde60 r6:8564f200 r5:85782400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe9fb0 to 0xebbe9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85648bc0
INFO: task kworker/0:405:5509 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b4626000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:781:5510 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:781   state:D stack:0     pid:5510  tgid:5510  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000113 r6:ebbd9d8c r5:85783000
 r4:85783000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85783000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb645000
 r5:8574db8c r4:8574d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574db8c r4:8564f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85783000 r8:8564f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f280 r8:80287e08 r7:ebbe5e60 r6:8564f300 r5:85783000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbd9fb0 to 0xebbd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856407c0
INFO: task kworker/1:781:5510 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b48ce000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:782:5511 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:782   state:D stack:0     pid:5511  tgid:5511  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000013 r6:ebbedd8c r5:85783c00
 r4:85783c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85783c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb707000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574eb8c r4:8574e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574eb8c r4:8564f380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85783c00 r8:8564f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f380 r8:80287e08 r7:ebbd9e60 r6:8564f400 r5:85783c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbedfb0 to 0xebbedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640a80
INFO: task kworker/1:782:5511 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b4db7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574df8c r4:8574dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574df8c r4:8564f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85784800 r8:8564f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f480 r8:80287e08 r7:ebbede60 r6:8564f500 r5:85784800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf1fb0 to 0xebbf1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640b80
INFO: task kworker/1:783:5514 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b53cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:852cfa40
task:kworker/1:784   state:D stack:0     pid:5516  tgid:5516  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebbf5d84 r8:00000002 r7:60000013 r6:ebbf5d8c r5:85785400
 r4:85785400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85785400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640e80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574e38c r4:8574e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574e38c r4:8564f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85785400 r8:8564f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f580 r8:80287e08 r7:ebbede60 r6:8564f600 r5:85785400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf5fb0 to 0xebbf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640c80
INFO: task kworker/1:784:5516 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b53cd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
 r5:85786000 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85640fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574e78c r4:8574e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574e78c r4:8564f680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85786000 r8:8564f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f680 r8:80287e08 r7:ebbede60 r6:8564f700 r5:85786000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbf9fb0 to 0xebbf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85640e40
INFO: task kworker/1:785:5518 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b58d6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:eaf29dc0
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:786   state:D stack:0     pid:5520  tgid:5520  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbfde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85786c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574ef8c r4:8574ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574ef8c r4:8564f780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85786c00 r8:8564f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f780 r8:80287e08 r7:ebbede60 r6:8564f800 r5:85786c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbfdfb0 to 0xebbfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662000
INFO: task kworker/1:786:5520 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b5c80000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:787:5521 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:787   state:D stack:0     pid:5521  tgid:5521  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc05d84 r8:00000002 r7:60000013 r6:ebc05d8c r5:85788000
 r4:85788000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85788000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb803000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574f38c r4:8574f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574f38c r4:8564f880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85788000 r8:8564f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f880 r8:80287e08 r7:ebbfde60 r6:8564f900 r5:85788000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc05fb0 to 0xebc05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662000
INFO: task kworker/1:787:5521 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b6192000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:788:5524 blocked for more than 469 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:788   state:D stack:0     pid:5524  tgid:5524  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc01d84 r8:00000002 r7:60000113 r6:ebc01d8c r5:85788c00
 r4:85788c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85788c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856625c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb81b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574f78c r4:8574f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574f78c r4:8564fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85788c00 r8:8564fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fa00 r8:80287e08 r7:ebc05e60 r6:8564fa80 r5:85788c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc01fb0 to 0xebc01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856623c0
INFO: task kworker/1:788:5524 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b63f8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:789:5526 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:789   state:D stack:0     pid:5526  tgid:5526  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc0dd84 r8:00000002 r7:60000013 r6:ebc0dd8c r5:85789800
 r4:85789800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85789800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85789800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb82f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574fb8c r4:8574f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574fb8c r4:8564f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85789800 r8:8564f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564f980 r8:80287e08 r7:ebc01e60 r6:8564fb00 r5:85789800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc0dfb0 to 0xebc0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662440
INFO: task kworker/1:789:5526 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b6761000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:790:5527 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:790   state:D stack:0     pid:5527  tgid:5527  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:8578a400
 r4:8578a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8578a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575c38c r4:8575c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575c38c r4:8564fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578a400 r8:8564fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fb80 r8:80287e08 r7:ebc0de60 r6:8564fc00 r5:8578a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc11fb0 to 0xebc11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662680
INFO: task kworker/1:790:5527 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b69f1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:791:5530 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:791   state:D stack:0     pid:5530  tgid:5530  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:84ae6000
 r4:84ae6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662bc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba45000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8574ff8c r4:8574fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8574ff8c r4:8564fc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae6000 r8:8564fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fc80 r8:80287e08 r7:ebc11e60 r6:8532fd80 r5:84ae6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc15fb0 to 0xebc15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662780
INFO: task kworker/1:791:5530 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b6c6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:406:5531 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:406   state:D stack:0     pid:5531  tgid:5531  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc19d84 r8:00000002 r7:60000113 r6:ebc19d8c r5:84ae4800
 r4:84ae4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ae4800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb865000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d838c r4:856d8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d838c r4:8532fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae4800 r8:8532fe2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532fe00 r8:80287e08 r7:ebabde60 r6:8532fe80 r5:84ae4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc19fb0 to 0xebc19ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85672140
INFO: task kworker/0:406:5531 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b6eb2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:407:5533 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:407   state:D stack:0     pid:5533  tgid:5533  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:84ae6c00
 r4:84ae6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856724c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba19000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d878c r4:856d8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d878c r4:8532ff00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae6c00 r8:8532ff2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8532ff00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8532ff00 r8:80287e08 r7:ebabde60 r6:8532ff80 r5:84ae6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc09fb0 to 0xebc09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85672140
INFO: task kworker/0:407:5533 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b711b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:408:5536 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:408   state:D stack:0     pid:5536  tgid:5536  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:84ae3c00
 r4:84ae3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ae3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e08b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d978c r4:856d9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d978c r4:8566f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae3c00 r8:8566f02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f000 r8:80287e08 r7:ebabde60 r6:8566f080 r5:84ae3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc25fb0 to 0xebc25ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85672440
INFO: task kworker/0:408:5536 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b736b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:792:5538 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:792   state:D stack:0     pid:5538  tgid:5538  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc2dd84 r8:00000002 r7:60000113 r6:ebc2dd8c r5:84b98000
 r4:84b98000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b98000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575c78c r4:8575c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575c78c r4:8564fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b98000 r8:8564fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fd00 r8:80287e08 r7:ebc11e60 r6:8566f100 r5:84b98000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc2dfb0 to 0xebc2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662ac0
INFO: task kworker/1:792:5538 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b74b8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:793:5540 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:793   state:D stack:0     pid:5540  tgid:5540  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:84b99800
 r4:84b99800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b99800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85648c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebadd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575cf8c r4:8575cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575cf8c r4:8564fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b99800 r8:8564fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fe00 r8:80287e08 r7:ebc2de60 r6:8566f180 r5:84b99800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc35fb0 to 0xebc35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662b40
INFO: task kworker/1:793:5540 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b7954000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:794:5541 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:794   state:D stack:0     pid:5541  tgid:5541  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc39d84 r8:00000002 r7:60000113 r6:ebc39d8c r5:84b9a400
 r4:84b9a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85662d40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575cb8c r4:8575c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575cb8c r4:8564fd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9a400 r8:8564fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fd80 r8:80287e08 r7:ebc35e60 r6:8566f200 r5:84b9a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc39fb0 to 0xebc39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662b40
INFO: task kworker/1:794:5541 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b7bd4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:795:5543 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:795   state:D stack:0     pid:5543  tgid:5543  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc41d84 r8:00000002 r7:60000113 r6:ebc41d8c r5:84b98c00
 r4:84b98c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b98c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856627c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbd1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575d38c r4:8575d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575d38c r4:8564fe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b98c00 r8:8564feac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564fe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564fe80 r8:80287e08 r7:ebc35e60 r6:8566f280 r5:84b98c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc41fb0 to 0xebc41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662d80
INFO: task kworker/1:795:5543 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b7f19000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:409:5545 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:409   state:D stack:0     pid:5545  tgid:5545  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc3dd84 r8:00000002 r7:60000113 r6:ebc3dd8c r5:84b9bc00
 r4:84b9bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845ee800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b9bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d8f8c r4:856d8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d8f8c r4:8566f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9bc00 r8:8566f32c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f300 r8:80287e08 r7:ebc25e60 r6:8566f380 r5:84b9bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc3dfb0 to 0xebc3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85672b80
INFO: task kworker/0:409:5545 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b83ed000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:796:5548 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:796   state:D stack:0     pid:5548  tgid:5548  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000013 r6:ebc59d8c r5:84b9c800
 r4:84b9c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575db8c r4:8575d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575db8c r4:8564ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9c800 r8:8564ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8564ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8564ff80 r8:80287e08 r7:ebc41e60 r6:8566f400 r5:84b9c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc59fb0 to 0xebc59ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85607c40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575d78c r4:8575d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575d78c r4:8566e000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9e000 r8:8566e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e000 r8:80287e08 r7:ebc59e60 r6:8566f480 r5:84b9e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc5dfb0 to 0xebc5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8556efc0
INFO: task kworker/1:797:5549 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b87fc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:798:5551 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:798   state:D stack:0     pid:5551  tgid:5551  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc69d84 r8:00000002 r7:60000113 r6:ebc69d8c r5:84b9d400
 r4:84b9d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676d00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575eb8c r4:8575e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575eb8c r4:8566e080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9d400 r8:8566e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e080 r8:80287e08 r7:ebc59e60 r6:8566f500 r5:84b9d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc69fb0 to 0xebc69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85662900
INFO: task kworker/1:798:5551 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b8b69000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:799:5553 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:799   state:D stack:0     pid:5553  tgid:5553  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc21d84 r8:00000002 r7:60000013 r6:ebc21d8c r5:8578c800
 r4:8578c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8578c800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfa9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575df8c r4:8575dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575df8c r4:8566e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578c800 r8:8566e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e100 r8:80287e08 r7:ebc69e60 r6:8566e180 r5:8578c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc21fb0 to 0xebc21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676080
INFO: task kworker/1:799:5553 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b93a9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:800:5556 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:800   state:D stack:0     pid:5556  tgid:5556  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc1dd84 r8:00000002 r7:60000013 r6:ebc1dd8c r5:8578e000
 r4:8578e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8578e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfcd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575e38c r4:8575e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575e38c r4:8566e200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578e000 r8:8566e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e200 r8:80287e08 r7:ebc69e60 r6:8566e280 r5:8578e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc1dfb0 to 0xebc1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676400
INFO: task kworker/1:800:5556 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b93a9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:801:5558 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:801   state:D stack:0     pid:5558  tgid:5558  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:8578d400
 r4:8578d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8578d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac73000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575e78c r4:8575e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575e78c r4:8566e300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578d400 r8:8566e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e300 r8:80287e08 r7:ebc69e60 r6:8566e380 r5:8578d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb79fb0 to 0xebb79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676200
INFO: task kworker/1:801:5558 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b9ab9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:410:5560 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:410   state:D stack:0     pid:5560  tgid:5560  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc89d84 r8:00000002 r7:60000113 r6:ebc89d8c r5:8578b000
 r4:8578b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8578b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d9f8c r4:856d9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d9f8c r4:8566f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578b000 r8:8566f5ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f580 r8:80287e08 r7:ebc25e60 r6:8566e400 r5:8578b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc89fb0 to 0xebc89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee7c0
INFO: task kworker/0:410:5560 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   b9d4e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:411:5562 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:411   state:D stack:0     pid:5562  tgid:5562  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc8dd84 r8:00000002 r7:60000113 r6:ebc8dd8c r5:8578bc00
 r4:8578bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856d9b8c r4:856d9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856d9b8c r4:8566f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578bc00 r8:8566f62c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f600 r8:80287e08 r7:ebc89e60 r6:8566e480 r5:8578bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc8dfb0 to 0xebc8dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee7c0
INFO: task kworker/0:411:5562 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ba3a6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:802:5563 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:802   state:D stack:0     pid:5563  tgid:5563  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:84b9ec00
 r4:84b9ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575ef8c r4:8575ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575ef8c r4:8566e500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9ec00 r8:8566e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e500 r8:80287e08 r7:ebc69e60 r6:8566f680 r5:84b9ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc75fb0 to 0xebc75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676680
INFO: task kworker/1:802:5563 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ba4ed000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:412:5566 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:412   state:D stack:0     pid:5566  tgid:5566  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc85d84 r8:00000002 r7:60000113 r6:ebc85d8c r5:84b9b000
 r4:84b9b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b9b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc85e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b9b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb98b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856da38c r4:856da000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856da38c r4:8566f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b9b000 r8:8566f72c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f700 r8:80287e08 r7:ebc89e60 r6:8566f780 r5:84b9b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc85fb0 to 0xebc85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/0:412:5566 is blocked on a mutex likely owned by task kworker/1:426:4465.
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ba67b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:413:5567 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:413   state:D stack:0     pid:5567  tgid:5567  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc91d84 r8:00000002 r7:60000113 r6:ebc91d8c r5:8478d400
 r4:8478d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8478d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85671f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8478d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb977000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576338c r4:85763000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8576338c r4:8566f800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8478d400 r8:8566f82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566f800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566f800 r8:80287e08 r7:ebc85e60 r6:8566f880 r5:8478d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc91fb0 to 0xebc91ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:82ac21e4
 r4:eaf29dc0
 r5:00001000 r4:dfd17000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8575f38c r4:8575f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575f38c r4:8566e580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849b8c00 r8:8566e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e580 r8:80287e08 r7:ebc75e60 r6:8566f900 r5:849b8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc9dfb0 to 0xebc9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676c40
INFO: task kworker/1:803:5571 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bad54000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:804:5572 blocked for more than 470 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:804   state:D stack:0     pid:5572  tgid:5572  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:849b9800
 r4:849b9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:849b9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r4:00000000
 r5:00001000 r4:eb4cf000
 r5:8575f78c r4:8575f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575f78c r4:8566e600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849b9800 r8:8566e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e600 r8:80287e08 r7:ebc9de60 r6:8566f980 r5:849b9800
1fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676d80
INFO: task kworker/1:804:5572 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bad54000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:805:5574 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:805   state:D stack:0     pid:5574  tgid:5574  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebca5d84 r8:00000002 r7:60000113 r6:ebca5d8c r5:849ba400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08
 r5:85760f8c r4:85760c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:8566e680
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:82ac21e4
 r4:eaf29dc0
 r5:00001000 r4:dfd17000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:849bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb50b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8575fb8c r4:8575f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575fb8c r4:8566e700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849bbc00 r8:8566e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e700 r8:80287e08 r7:ebca5e60 r6:8566fa80 r5:849bbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcadfb0 to 0xebcadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666000
INFO: task kworker/1:806:5576 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bb459000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:807:5578 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:807   state:D stack:0     pid:5578  tgid:5578  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcb5d84 r8:00000002 r7:60000113 r6:ebcb5d8c r5:849bb000
 r4:849bb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:849bb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08
 r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
 r5:8575ff8c r4:8575fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8575ff8c r4:8566e780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849bb000 r8:8566e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e780 r8:80287e08 r7:ebca5e60 r6:8566fb00 r5:849bb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcb5fb0 to 0xebcb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666000
INFO: task kworker/1:807:5578 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bb58e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:808:5580 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:808   state:D stack:0     pid:5580  tgid:5580  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcbdd84 r8:00000002 r7:60000113 r6:ebcbdd8c r5:849bc800
 r4:849bc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:849bc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcbde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb587000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576038c r4:85760000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576038c r4:8566e800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849bc800 r8:8566e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e800 r8:80287e08 r7:ebca5e60 r6:8566fb80 r5:849bc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcbdfb0 to 0xebcbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666240
INFO: task kworker/1:808:5580 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bbb7a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:809:5582 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:809   state:D stack:0     pid:5582  tgid:5582  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcc5d84 r8:00000002 r7:60000113 r6:ebcc5d8c r5:849bd400
 r4:849bd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:849bd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb743000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576078c r4:85760400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576078c r4:8566e880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849bd400 r8:8566e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e880 r8:80287e08 r7:ebca5e60 r6:8566fc00 r5:849bd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc5fb0 to 0xebcc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666280
INFO: task kworker/1:809:5582 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bbc87000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:810:5584 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:810   state:D stack:0     pid:5584  tgid:5584  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:85791800
 r4:85791800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85791800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856666c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85791800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb777000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85760b8c r4:85760800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85760b8c r4:8566e900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85791800 r8:8566e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566e900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566e900 r8:80287e08 r7:ebca5e60 r6:8566e980 r5:85791800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc99fb0 to 0xebc99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666380
INFO: task kworker/1:810:5584 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bc70d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:811:5588 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:811   state:D stack:0     pid:5588  tgid:5588  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcc9d84 r8:00000002 r7:60000113 r6:ebcc9d8c r5:85792400
 r4:85792400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85792400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85792400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb871000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576138c r4:85761000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576138c r4:8566ea00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85792400 r8:8566ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566ea00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ea00 r8:80287e08 r7:ebca5e60 r6:8566ea80 r5:85792400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc9fb0 to 0xebcc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666680
INFO: task kworker/1:811:5588 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bcc34000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:812:5590 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:812   state:D stack:0     pid:5590  tgid:5590  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcd1d84 r8:00000002 r7:60000113 r6:ebcd1d8c r5:85793000
 r4:85793000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85793000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85793000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb891000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576178c r4:85761400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576178c r4:8566eb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85793000 r8:8566eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566eb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566eb00 r8:80287e08 r7:ebcc9e60 r6:8566eb80 r5:85793000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd1fb0 to 0xebcd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856667c0
INFO: task kworker/1:812:5590 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bcf85000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:813:5591 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:813   state:D stack:0     pid:5591  tgid:5591  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:85793c00
 r4:85793c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85793c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666c80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85793c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85761b8c r4:85761800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85761b8c r4:8566ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85793c00 r8:8566ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ec00 r8:80287e08 r7:ebcd1e60 r6:8566ec80 r5:85793c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd5fb0 to 0xebcd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:856667c0
INFO: task kworker/1:813:5591 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bd1bb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:814:5593 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:814   state:D stack:0     pid:5593  tgid:5593  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcd9d84 r8:00000002 r7:60000013 r6:ebcd9d8c r5:85794800
 r4:85794800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85794800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85794800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85761f8c r4:85761c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85761f8c r4:8566ed00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85794800 r8:8566ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566ed00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ed00 r8:80287e08 r7:ebcd5e60 r6:8566ed80 r5:85794800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcd9fb0 to 0xebcd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666b00
INFO: task kworker/1:814:5593 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bd40e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:815:5595 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:815   state:D stack:0     pid:5595  tgid:5595  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcddd84 r8:00000002 r7:60000013 r6:ebcddd8c r5:85795400
 r4:85795400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85795400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85795400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb905000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576238c r4:85762000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576238c r4:8566ee00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85795400 r8:8566ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566ee00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ee00 r8:80287e08 r7:ebcd9e60 r6:8566ee80 r5:85795400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcddfb0 to 0xebcddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666c40
INFO: task kworker/1:815:5595 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:816:5597 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:816   state:D stack:0     pid:5597  tgid:5597  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebce1d84 r8:00000002 r7:60000113 r6:ebce1d8c r5:85796000
 r4:85796000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85796000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85796000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb91f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576278c r4:85762400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576278c r4:8566ef00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85796000 r8:8566ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8566ef00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ef00 r8:80287e08 r7:ebcdde60 r6:8566ef80 r5:85796000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebce1fb0 to 0xebce1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676a40
INFO: task kworker/1:816:5597 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bd6d1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85763f8c r4:85763c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:818:5601 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:818   state:D stack:0     pid:5601  tgid:5601  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcedd84 r8:00000002 r7:60000013 r6:ebcedd8c r5:849bec00
 r4:849bec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:849bec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:849bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb935000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85762b8c r4:85762800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85762b8c r4:857ab000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:849bec00 r8:857ab02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab000 r8:80287e08 r7:ebce9e60 r6:8566fd00 r5:849bec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcedfb0 to 0xebcedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ae100
INFO: task kworker/1:818:5601 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bddc1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae340
 r5:85762f8c r4:85762c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:849b8000 r8:857ab0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   be0ba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:820:5604 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:820   state:D stack:0     pid:5604  tgid:5604  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:84ae5400
 r4:84ae5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ae5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ae5400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8576378c r4:85763400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8576378c r4:857ab100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ae5400 r8:857ab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab100 r8:80287e08 r7:ebce9e60 r6:8566fe00 r5:84ae5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcf5fb0 to 0xebcf5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ae300
INFO: task kworker/1:820:5604 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   be23f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:414:5606 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:414   state:D stack:0     pid:5606  tgid:5606  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebce5d84 r8:00000002 r7:60000113 r6:ebce5d8c r5:85798000
 r4:85798000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85798000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08
 r5:858b778c r4:858b7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b778c r4:8566fe80
 r10:61c88647 r9:85798000 r8:8566feac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
 r4:00000000
9d20:                   be652000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r4:8530ac00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:85798c00 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856dab8c r4:856da800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856dab8c r4:8566ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85798c00 r8:8566ffac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8566ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8566ff80 r8:80287e08 r7:ebce5e60 r6:857b2000 r5:85798c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc81fb0 to 0xebc81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857af080
INFO: task kworker/0:415:5608 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   be767000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:821:5611 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:821   state:D stack:0     pid:5611  tgid:5611  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd05d84 r8:00000002 r7:60000013 r6:ebd05d8c r5:8579b000
 r4:8579b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd05e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85763b8c r4:85763800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85763b8c r4:857ab180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579b000 r8:857ab1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r4:eaf29dc0
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
task:kworker/1:822   state:D stack:0     pid:5613  tgid:5613  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd0dd84 r8:00000002 r7:60000113 r6:ebd0dd8c r5:8579bc00
 r4:8579bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aea00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e038c r4:857e0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e038c r4:857ab200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579bc00 r8:857ab22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab200 r8:80287e08 r7:ebce9e60 r6:857b2100 r5:8579bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd0dfb0 to 0xebd0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ae700
INFO: task kworker/1:822:5613 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bec41000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e0f8c r4:857e0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e0f8c r4:857ab280
 r10:00000000 r9:857ab280 r8:80287e08 r7:ebd0de60 r6:857b2180 r5:8579a400
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r5:852bd78c r4:852bd400
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:824:5617 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:824   state:D stack:0     pid:5617  tgid:5617  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd1dd84 r8:00000002 r7:60000113 r6:ebd1dd8c r5:8579c800
 r4:8579c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aeb00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e078c r4:857e0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e078c r4:857ab300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579c800 r8:857ab32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab300 r8:80287e08 r7:ebd15e60 r6:857b2200 r5:8579c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd1dfb0 to 0xebd1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ae900
INFO: task kworker/1:824:5617 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bf0e7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:825:5618 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:825   state:D stack:0     pid:5618  tgid:5618  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd21d84 r8:00000002 r7:60000013 r6:ebd21d8c r5:8579d400
 r4:8579d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd21e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aec80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e0b8c r4:857e0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e0b8c r4:857ab380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579d400 r8:857ab3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab380 r8:80287e08 r7:ebd15e60 r6:857b2280 r5:8579d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd21fb0 to 0xebd21ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ae900
INFO: task kworker/1:825:5618 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bf200000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:826:5620 blocked for more than 471 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:826   state:D stack:0     pid:5620  tgid:5620  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd2dd84 r8:00000002 r7:60000113 r6:ebd2dd8c r5:84ab0000
 r4:84ab0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd2de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd4b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e238c r4:857e2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e238c r4:857ab400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab0000 r8:857ab42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab400 r8:80287e08 r7:ebd15e60 r6:857b2300 r5:84ab0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd2dfb0 to 0xebd2dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r4:00000000
 r5:00001000 r4:dfd17000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r4:00000001
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:827:5622 blocked for more than 472 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd31d84 r8:00000002 r7:60000013 r6:ebd31d8c r5:84ab0c00
 r4:84ab0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd31e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aef00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e138c r4:857e1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e138c r4:857ab480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab0c00 r8:857ab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab480 r8:80287e08 r7:ebd2de60 r6:857b2380 r5:84ab0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd31fb0 to 0xebd31ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857aec40
INFO: task kworker/1:827:5622 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bf6d2000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:828:5624 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:828   state:D stack:0     pid:5624  tgid:5624  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd39d84 r8:00000002 r7:60000113 r6:ebd39d8c r5:84ab2400
 r4:84ab2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd39e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebba7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e178c r4:857e1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e178c r4:857ab500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab2400 r8:857ab52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab500 r8:80287e08 r7:ebd2de60 r6:857b2400 r5:84ab2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd39fb0 to 0xebd39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857aef40
INFO: task kworker/1:828:5624 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bf903000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:829:5627 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:829   state:D stack:0     pid:5627  tgid:5627  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd45d84 r8:00000002 r7:60000113 r6:ebd45d8c r5:84ab4800
 r4:84ab4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd45e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e1b8c r4:857e1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e1b8c r4:857ab580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab4800 r8:857ab5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab580 r8:80287e08 r7:ebd2de60 r6:857b2480 r5:84ab4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd45fb0 to 0xebd45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85666e00
INFO: task kworker/1:829:5627 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bfb6d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:830:5629 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:830   state:D stack:0     pid:5629  tgid:5629  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcf9d84 r8:00000002 r7:60000013 r6:ebcf9d8c r5:85790c00
 r4:85790c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85790c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e1f8c r4:857e1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e1f8c r4:857ab600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85790c00 r8:857ab62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab600 r8:80287e08 r7:ebd2de60 r6:857ab680 r5:85790c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcf9fb0 to 0xebcf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb080
INFO: task kworker/1:830:5629 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   bfd8e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:831:5630 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:831   state:D stack:0     pid:5630  tgid:5630  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcfdd84 r8:00000002 r7:60000113 r6:ebcfdd8c r5:85796c00
 r4:85796c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85796c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcfde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e278c r4:857e2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e278c r4:857ab700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85796c00 r8:857ab72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab700 r8:80287e08 r7:ebd2de60 r6:857ab780 r5:85796c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcfdfb0 to 0xebcfdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb2c0
INFO: task kworker/1:831:5630 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c070a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:832:5632 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:832   state:D stack:0     pid:5632  tgid:5632  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd55d84 r8:00000002 r7:60000113 r6:ebd55d8c r5:8578ec00
 r4:8578ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8578ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8578ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfb13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e2b8c r4:857e2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e2b8c r4:857ab800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8578ec00 r8:857ab82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab800 r8:80287e08 r7:ebcfde60 r6:857ab880 r5:8578ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd55fb0 to 0xebd55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb180
INFO: task kworker/1:832:5632 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c0b40000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:833:5634 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:833   state:D stack:0     pid:5634  tgid:5634  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:85818c00
 r4:85818c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85818c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bb900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0797000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e2f8c r4:857e2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e2f8c r4:857ab900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85818c00 r8:857ab92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857ab900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857ab900 r8:80287e08 r7:ebd55e60 r6:857ab980 r5:85818c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba75fb0 to 0xeba75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb240
INFO: task kworker/1:833:5634 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c0c70000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bba40
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r7:ddde2d80 r6:83018200 r5:857e338c r4:857aba00
 r4:857aba00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb700
INFO: task kworker/1:834:5637 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c0d6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:835:5639 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:835   state:D stack:0     pid:5639  tgid:5639  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc45d84 r8:00000002 r7:60000013 r6:ebc45d8c r5:8581a400
 r4:8581a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb215000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e3f8c r4:857e3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e3f8c r4:857abb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581a400 r8:857abb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857abb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857abb00 r8:80287e08 r7:ebd49e60 r6:857abb80 r5:8581a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc45fb0 to 0xebc45ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bb8c0
INFO: task kworker/1:835:5639 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c12da000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:836:5641 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:836   state:D stack:0     pid:5641  tgid:5641  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:8581b000
 r4:8581b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbc00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaed7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e378c r4:857e3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e378c r4:857abc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581b000 r8:857abc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857abc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857abc00 r8:80287e08 r7:ebc45e60 r6:857abc80 r5:8581b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc49fb0 to 0xebc49ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bba80
INFO: task kworker/1:836:5641 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c153d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:837:5643 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:837   state:D stack:0     pid:5643  tgid:5643  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000013 r6:ebc51d8c r5:8581bc00
 r4:8581bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bbd40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb021000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e3b8c r4:857e3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e3b8c r4:857abd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581bc00 r8:857abd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857abd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857abd00 r8:80287e08 r7:ebc45e60 r6:857abd80 r5:8581bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebc51fb0 to 0xebc51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bbb80
INFO: task kworker/1:837:5643 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c18ab000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:838:5645 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:838   state:D stack:0     pid:5645  tgid:5645  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd61d84 r8:00000002 r7:60000113 r6:ebd61d8c r5:8581c800
 r4:8581c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb381000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e438c r4:857e4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e438c r4:857abe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581c800 r8:857abe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857abe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857abe00 r8:80287e08 r7:ebc45e60 r6:857abe80 r5:8581c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd61fb0 to 0xebd61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bbcc0
INFO: task kworker/1:838:5645 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c18ab000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:839:5647 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:839   state:D stack:0     pid:5647  tgid:5647  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd65d84 r8:00000002 r7:60000113 r6:ebd65d8c r5:8581d400
 r4:8581d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb411000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e478c r4:857e4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e478c r4:857abf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581d400 r8:857abf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857abf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857abf00 r8:80287e08 r7:ebd61e60 r6:857abf80 r5:8581d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd65fb0 to 0xebd65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857bbe40
INFO: task kworker/1:839:5647 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c1c9f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:840:5648 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:840   state:D stack:0     pid:5648  tgid:5648  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd69d84 r8:00000002 r7:60000113 r6:ebd69d8c r5:8581e000
 r4:8581e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8581e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd69e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cea00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8581e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e5b8c r4:857e5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e5b8c r4:857d0000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8581e000 r8:857d002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0000 r8:80287e08 r7:ebd65e60 r6:857d0080 r5:8581e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd69fb0 to 0xebd69ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ce000
INFO: task kworker/1:840:5648 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c1e31000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:841:5651 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:841   state:D stack:0     pid:5651  tgid:5651  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:84ab5400
 r4:84ab5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb461000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e4b8c r4:857e4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e4b8c r4:857d0100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab5400 r8:857d012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0100 r8:80287e08 r7:ebd69e60 r6:857b2500 r5:84ab5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa5fb0 to 0xebaa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ce280
INFO: task kworker/1:841:5651 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c1fde000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:842:5653 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:842   state:D stack:0     pid:5653  tgid:5653  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd6dd84 r8:00000002 r7:60000113 r6:ebd6dd8c r5:84ab3000
 r4:84ab3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd6de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb615000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e4f8c r4:857e4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e4f8c r4:857d0180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab3000 r8:857d01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0180 r8:80287e08 r7:ebd69e60 r6:857b2580 r5:84ab3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd6dfb0 to 0xebd6dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ce200
INFO: task kworker/1:842:5653 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c2270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:416:5655 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:416   state:D stack:0     pid:5655  tgid:5655  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd75d84 r8:00000002 r7:60000113 r6:ebd75d8c r5:84ab6000
 r4:84ab6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd75e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2b00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856daf8c r4:856dac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856daf8c r4:857b2600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab6000 r8:857b262c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:857b2600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857b2600 r8:80287e08 r7:ebce5e60 r6:857b2680 r5:84ab6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd75fb0 to 0xebd75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845ee9c0
INFO: task kworker/0:416:5655 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c2373000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:843:5658 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:843   state:D stack:0     pid:5658  tgid:5658  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd79d84 r8:00000002 r7:60000113 r6:ebd79d8c r5:84ab6c00
 r4:84ab6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb66d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e538c r4:857e5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e538c r4:857d0200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab6c00 r8:857d022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0200 r8:80287e08 r7:ebd69e60 r6:857b2700 r5:84ab6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd79fb0 to 0xebd79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ce400
INFO: task kworker/1:843:5658 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c2373000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:844:5659 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:844   state:D stack:0     pid:5659  tgid:5659  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd7dd84 r8:00000002 r7:60000113 r6:ebd7dd8c r5:84ab3c00
 r4:84ab3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84ab3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd7de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e578c r4:857e5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e578c r4:857d0280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab3c00 r8:857d02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0280 r8:80287e08 r7:ebd69e60 r6:857b2780 r5:84ab3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd7dfb0 to 0xebd7dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ce400
INFO: task kworker/1:844:5659 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c2985000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:845:5663 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:845   state:D stack:0     pid:5663  tgid:5663  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd8dd84 r8:00000002 r7:60000013 r6:ebd8dd8c r5:85799800
 r4:85799800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85799800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd8de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ceb00
 r5:00001000 r4:eb729000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:82ac21e4
 r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:846:5664 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:846   state:D stack:0     pid:5664  tgid:5664  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd91d84 r8:00000002 r7:60000013 r6:ebd91d8c r5:8579ec00
 r4:8579ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cedc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb82b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e678c r4:857e6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e678c r4:857d0380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579ec00 r8:857d03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0380 r8:80287e08 r7:ebd8de60 r6:857b2880 r5:8579ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd91fb0 to 0xebd91ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ceb40
INFO: task kworker/1:846:5664 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c2a6f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r4:eaf29dc0
 r5:852bd78c r4:852bd400
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:eb805000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e638c r4:857e6000
 r7:ddde2d80 r6:83018200 r5:857e638c r4:857d0400
 r10:00000000 r9:857d0400 r8:80287e08 r7:ebd91e60 r6:857d0480 r5:8581ec00
INFO: task kworker/1:847:5665 is blocked on a mutex likely owned by task kworker/1:426:4465.
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c308d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:848:5669 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:848   state:D stack:0     pid:5669  tgid:5669  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd89d84 r8:00000002 r7:60000113 r6:ebd89d8c r5:85818000
 r4:85818000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85818000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cef00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85818000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb843000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e6b8c r4:857e6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e6b8c r4:857d0500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85818000 r8:857d052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0500 r8:80287e08 r7:ebd91e60 r6:857d0580 r5:85818000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd89fb0 to 0xebd89ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857cec40
INFO: task kworker/1:848:5669 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c31c7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ce240
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85790000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb867000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e6f8c r4:857e6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e6f8c r4:857d0600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85790000 r8:857d062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0600 r8:80287e08 r7:ebd89e60 r6:857d0680 r5:85790000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd81fb0 to 0xebd81ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857cec40
INFO: task kworker/1:849:5670 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c33f5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:850:5672 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:850   state:D stack:0     pid:5672  tgid:5672  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd9dd84 r8:00000002 r7:60000113 r6:ebd9dd8c r5:85820000
 r4:85820000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85820000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd9de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e738c r4:857e7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e738c r4:857d0700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85820000 r8:857d072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0700 r8:80287e08 r7:ebd81e60 r6:857d0780 r5:85820000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd9dfb0 to 0xebd9dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857ced80
INFO: task kworker/1:850:5672 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c35d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:851:5674 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:851   state:D stack:0     pid:5674  tgid:5674  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebda9d84 r8:00000002 r7:60000013 r6:ebda9d8c r5:84640c00
 r4:84640c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84640c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e778c r4:857e7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e778c r4:857d0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84640c00 r8:857d082c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0800 r8:80287e08 r7:ebd9de60 r6:857b2900 r5:84640c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda9fb0 to 0xebda9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858150c0
INFO: task kworker/1:851:5674 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c36ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:852:5675 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:852   state:D stack:0     pid:5675  tgid:5675  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdadd84 r8:00000002 r7:60000013 r6:ebdadd8c r5:84642400
 r4:84642400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84642400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2ec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84642400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbbf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856db78c r4:856db400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:856db78c r4:857d0880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84642400 r8:857d08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0880 r8:80287e08 r7:ebda9e60 r6:857b2980 r5:84642400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdadfb0 to 0xebdadff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815180
INFO: task kworker/1:852:5675 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c3c80000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:853:5677 blocked for more than 472 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:853   state:D stack:0     pid:5677  tgid:5677  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdb1d84 r8:00000002 r7:60000113 r6:ebdb1d8c r5:84643000
 r4:84643000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84643000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84643000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e7b8c r4:857e7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857e7b8c r4:857d0900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84643000 r8:857d092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0900 r8:80287e08 r7:ebdade60 r6:857b2a00 r5:84643000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb1fb0 to 0xebdb1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815280
INFO: task kworker/1:853:5677 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:417:5680 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:417   state:D stack:0     pid:5680  tgid:5680  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebda5d84 r8:00000002 r7:60000113 r6:ebda5d8c r5:84643c00
 r4:84643c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84643c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebda5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84643c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebab9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857e7f8c r4:857e7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:857e7f8c r4:857b2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84643c00 r8:857b2aac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:857b2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857b2a80 r8:80287e08 r7:ebce5e60 r6:857b2b00 r5:84643c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda5fb0 to 0xebda5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857d2980
INFO: task kworker/0:417:5680 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
 r5:84644800 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815900
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ec38c r4:857ec000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ec38c r4:857d0980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84644800 r8:857d09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0980 r8:80287e08 r7:ebdade60 r6:857b2b80 r5:84644800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebda1fb0 to 0xebda1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815580
INFO: task kworker/1:854:5682 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c40f4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:418:5683 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:418   state:D stack:0     pid:5683  tgid:5683  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:84645400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb5e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84645400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebaf5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856db38c r4:856db000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856db38c r4:857b2c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84645400 r8:857b2c2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:857b2c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857b2c00 r8:80287e08 r7:ebce5e60 r6:857b2c80 r5:84645400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb5fb0 to 0xebdb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857d2ac0
INFO: task kworker/0:418:5683 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c4419000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
      Not tainted 6.15.0-rc7-syzkaller #0
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd99e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84646000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eae67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:856dbf8c r4:856dbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:856dbf8c r4:857b2d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84646000 r8:857b2d2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:857b2d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857b2d00 r8:80287e08 r7:ebce5e60 r6:857b2d80 r5:84646000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd99fb0 to 0xebd99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:857d2e00
INFO: task kworker/0:419:5686 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c4757000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:855:5688 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:855   state:D stack:0     pid:5688  tgid:5688  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdc1d84 r8:00000002 r7:60000113 r6:ebdc1d8c r5:84641800
 r4:84641800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84641800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84641800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc4b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ec78c r4:857ec400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ec78c r4:857d0a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84641800 r8:857d0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0a00
 r10:00000000 r9:857d0a00 r8:80287e08 r7:ebda1e60 r6:857b2e00 r5:84641800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r5:80070113 r4:80239bb0
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r5:00001000 r4:dfd17000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:856:5690 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:856   state:D stack:0     pid:5690  tgid:5690  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdc9d84 r8:00000002 r7:60000113 r6:ebdc9d8c r5:8579e000
 r4:8579e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8579e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdc9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8579e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc63000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ecb8c r4:857ec800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ecb8c r4:857d0a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8579e000 r8:857d0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0a80 r8:80287e08 r7:ebdc1e60 r6:857b2e80 r5:8579e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdc9fb0 to 0xebdc9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815800
INFO: task kworker/1:856:5690 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c4a56000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:857:5692 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:857   state:D stack:0     pid:5692  tgid:5692  ppid:2      task_flags:0x4208060 flags:0x00000000
 r4:84ab1800
 r5:84ab1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84ab1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebddf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ed38c r4:857ed000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ed38c r4:857d0b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84ab1800 r8:857d0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0b00 r8:80287e08 r7:ebdc9e60 r6:857b2f00 r5:84ab1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdd1fb0 to 0xebdd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815c00
INFO: task kworker/1:857:5692 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c4d4d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:858:5693 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:858   state:D stack:0     pid:5693  tgid:5693  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
 r4:84640000
 r5:84640000 r4:8291a680
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815c80
 r5:00001000 r4:ebc6f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ecf8c r4:857ecc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ecf8c r4:857d0c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84640000 r8:857d0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0c00 r8:80287e08 r7:ebdd1e60 r6:857b2f80 r5:84640000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdd5fb0 to 0xebdd5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815c00
INFO: task kworker/1:858:5693 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c4d4d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:859:5695 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:859   state:D stack:0     pid:5695  tgid:5695  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdddd84 r8:00000002 r7:60000113 r6:ebdddd8c r5:858c8c00
 r4:858c8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858c8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebddde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858155c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebdfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857edb8c r4:857ed800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857edb8c r4:857d0b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858c8c00 r8:857d0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0b80 r8:80287e08 r7:ebdd1e60 r6:85858000 r5:858c8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdddfb0 to 0xebdddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815a40
INFO: task kworker/1:859:5695 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c538d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:860:5697 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:860   state:D stack:0     pid:5697  tgid:5697  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdedd84 r8:00000002 r7:60000113 r6:ebdedd8c r5:858c8000
 r4:858c8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858c8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebdef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ed78c r4:857ed400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ed78c r4:857d0c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858c8000 r8:857d0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0c80 r8:80287e08 r7:ebddde60 r6:85858080 r5:858c8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdedfb0 to 0xebdedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815bc0
INFO: task kworker/1:860:5697 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c5628000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:861:5700 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:861   state:D stack:0     pid:5700  tgid:5700  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe09d84 r8:00000002 r7:60000113 r6:ebe09d8c r5:858cb000
 r4:858cb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858cb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe09e08
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862180
 r5:00001000 r4:ebe37000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857eeb8c r4:857ee800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857eeb8c r4:857d0d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858cb000 r8:857d0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0d00 r8:80287e08 r7:ebddde60 r6:85858100 r5:858cb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe09fb0 to 0xebe09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85815bc0
INFO: task kworker/1:861:5700 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c5b06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:862:5701 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:862   state:D stack:0     pid:5701  tgid:5701  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe15d84 r8:00000002 r7:60000113 r6:ebe15d8c r5:858ca400
 r4:858ca400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858ca400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe15e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d2440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857edf8c r4:857edc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857edf8c r4:857d0d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:857d0d80
 r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
9d20:                   c5b06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:863:5703 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:863   state:D stack:0     pid:5703  tgid:5703  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe1dd84 r8:00000002 r7:60000013 r6:ebe1dd8c r5:858cc800
 r4:858cc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858cc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe1f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ee38c r4:857ee000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ee38c r4:857d0e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858cc800 r8:857d0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0e00 r8:80287e08 r7:ebe09e60 r6:85858200 r5:858cc800
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:864:5705 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:864   state:D stack:0     pid:5705  tgid:5705  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdb9e08
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ee78c r4:857ee400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ee78c r4:857d0e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85820c00 r8:857d0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0e80 r8:80287e08 r7:ebe09e60 r6:857d0f00 r5:85820c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdb9fb0 to 0xebdb9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85676940
INFO: task kworker/1:864:5705 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c5fef000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:865:5708 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862300
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857eef8c r4:857eec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857eef8c r4:857d0f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85822400 r8:857d0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:857d0f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:857d0f80 r8:80287e08 r7:ebe09e60 r6:85864000 r5:85822400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe29fb0 to 0xebe29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858620c0
INFO: task kworker/1:865:5708 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c63cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
 r4:85823000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe35e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862580
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ef78c r4:857ef400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ef78c r4:85864080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85823000 r8:858640ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864080 r8:80287e08 r7:ebe29e60 r6:85858280 r5:85823000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe35fb0 to 0xebe35ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862100
INFO: task kworker/1:866:5710 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c63cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:867   state:D stack:0     pid:5711  tgid:5711  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ef38c r4:857ef000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ef38c r4:85864100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858cd400 r8:8586412c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864100 r8:80287e08 r7:ebe35e60 r6:85858300 r5:858cd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe5dfb0 to 0xebe5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862100
INFO: task kworker/1:867:5711 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c6830000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0:                                     00000000 00000000 00000000 00000000
INFO: task kworker/1:868:5714 blocked for more than 473 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858626c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857efb8c r4:857ef800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857efb8c r4:85864180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858ce000 r8:858641ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864180 r8:80287e08 r7:ebe35e60 r6:85858380 r5:858ce000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe75fb0 to 0xebe75ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862380
INFO: task kworker/1:868:5714 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c6abd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:869:5716 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:869   state:D stack:0     pid:5716  tgid:5716  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe79d84 r8:00000002 r7:60000113 r6:ebe79d8c r5:858c9800
 r4:858c9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858c9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe79e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f038c r4:857f0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f038c r4:85864200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858c9800 r8:8586422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864200 r8:80287e08 r7:ebe75e60 r6:85858400 r5:858c9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe79fb0 to 0xebe79ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858625c0
INFO: task kworker/1:869:5716 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c6da1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:870:5719 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:870   state:D stack:0     pid:5719  tgid:5719  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r4:84646c00
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r5:857eff8c r4:857efc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857eff8c r4:85864280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84646c00 r8:858642ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864280 r8:80287e08 r7:ebe79e60 r6:85858480 r5:84646c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe95fb0 to 0xebe95ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862700
INFO: task kworker/1:870:5719 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c6da1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:871:5720 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:871   state:D stack:0     pid:5720  tgid:5720  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe99d84 r8:00000002 r7:60000113 r6:ebe99d8c r5:84670000
 r4:84670000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe99e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84670000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebea7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f0b8c r4:857f0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f0b8c r4:85864300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84670000 r8:8586432c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864300 r8:80287e08 r7:ebe79e60 r6:85858500 r5:84670000
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:eaf29dc0
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:857f078c r4:857f0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:85864380 r8:80287e08 r7:ebe99e60 r6:85858580 r5:84670c00
 r4:00000000
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84671800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0709000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f1f8c r4:857f1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f1f8c r4:85864400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84671800 r8:8586442c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864400 r8:80287e08 r7:ebe99e60 r6:85858600 r5:84671800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeb5fb0 to 0xebeb5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/1:874   state:D stack:0     pid:5725  tgid:5725  ppid:2      task_flags:0x4208060 flags:0x00000000
 r9:83018205 r8:84672400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
 r7:ddde2d80 r6:83018200 r5:857f0f8c r4:85864480
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
 r4:00000000
 r4:8530ac00
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r5:84673000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84673000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebec3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f138c r4:857f1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f138c r4:85864500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84673000 r8:8586452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864500 r8:80287e08 r7:ebeb5e60 r6:85858700 r5:84673000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed1fb0 to 0xebed1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862e40
INFO: task kworker/1:875:5727 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c7844000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:00001000 r4:dfd17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:876:5729 blocked for more than 473 seconds.
 r4:84674800
 r5:84674800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84674800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f178c r4:857f1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f178c r4:85864580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84674800 r8:858645ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864580 r8:80287e08 r7:ebeb5e60 r6:85858780 r5:84674800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed9fb0 to 0xebed9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85862d00
INFO: task kworker/1:876:5729 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c7c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:877:5731 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:877   state:D stack:0     pid:5731  tgid:5731  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebcc1d84 r8:00000002 r7:60000113 r6:ebcc1d8c r5:84675400
 r4:84675400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84675400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:00001000 r4:dfd73000
 r5:857f1b8c r4:857f1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f1b8c r4:85864600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84675400 r8:8586462c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864600 r8:80287e08 r7:ebeb5e60 r6:85858800 r5:84675400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebcc1fb0 to 0xebcc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872040
INFO: task kworker/1:877:5731 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c7c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:84676000
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd01e08
 r4:00000000
 r5:857f278c r4:857f2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f278c r4:85864680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84676000 r8:858646ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864680 r8:80287e08 r7:ebeb5e60 r6:85858880 r5:84676000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd01fb0 to 0xebd01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872040
INFO: task kworker/1:878:5733 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8128000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r4:8530ac00
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:879   state:D stack:0     pid:5736  tgid:5736  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebed5d84 r8:00000002 r7:60000013 r6:ebed5d8c r5:85824800
 r4:85824800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85824800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eac59000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f238c r4:857f2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f238c r4:85864700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85824800 r8:8586472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864700 r8:80287e08 r7:ebd01e60 r6:85864780 r5:85824800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebed5fb0 to 0xebed5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858722c0
INFO: task kworker/1:879:5736 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:00000000
 r5:852bd78c r4:852bd400
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdbdd84 r8:00000002 r7:60000113 r6:ebdbdd8c r5:85826c00
 r4:85826c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85826c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85826c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f2b8c r4:857f2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f2b8c r4:85864800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85826c00 r8:8586482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864800 r8:80287e08 r7:ebd01e60 r6:85864880 r5:85826c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdbdfb0 to 0xebdbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858722c0
INFO: task kworker/1:880:5737 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8643000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:881:5741 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:881   state:D stack:0     pid:5741  tgid:5741  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd3dd84 r8:00000002 r7:60000113 r6:ebd3dd8c r5:85826000
 r4:85826000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85826000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd3de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85826000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb2f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f2f8c r4:857f2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f2f8c r4:85864900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85826000 r8:8586492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864900 r8:80287e08 r7:ebdbde60 r6:85864980 r5:85826000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd3dfb0 to 0xebd3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858725c0
INFO: task kworker/1:881:5741 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8685000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:882:5742 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:882   state:D stack:0     pid:5742  tgid:5742  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd5dd84 r8:00000002 r7:60000113 r6:ebd5dd8c r5:85825400
 r4:85825400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85825400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd5de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872a40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f338c r4:857f3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f338c r4:85864a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85825400 r8:85864a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864a00 r8:80287e08 r7:ebd3de60 r6:85864a80 r5:85825400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd5dfb0 to 0xebd5dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872700
INFO: task kworker/1:882:5742 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8a74000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:883:5745 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:883   state:D stack:0     pid:5745  tgid:5745  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebeddd84 r8:00000002 r7:60000013 r6:ebeddd8c r5:85823c00
 r4:85823c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85823c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebedde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872b80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f378c r4:857f3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f378c r4:85864b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85823c00 r8:85864b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864b00 r8:80287e08 r7:ebd5de60 r6:85864b80 r5:85823c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeddfb0 to 0xebeddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858728c0
INFO: task kworker/1:883:5745 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8d1d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:884:5746 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:884   state:D stack:0     pid:5746  tgid:5746  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebee1d84 r8:00000002 r7:60000113 r6:ebee1d8c r5:85821800
 r4:85821800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85821800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872ec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85821800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb593000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f3f8c r4:857f3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f3f8c r4:85864c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85821800 r8:85864c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864c00 r8:80287e08 r7:ebedde60 r6:85864c80 r5:85821800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee1fb0 to 0xebee1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872a00
INFO: task kworker/1:884:5746 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8f14000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:885:5748 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:885   state:D stack:0     pid:5748  tgid:5748  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebee5d84 r8:00000002 r7:60000113 r6:ebee5d8c r5:85828000
 r4:85828000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85828000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85872d40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85828000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb52f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857f3b8c r4:857f3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857f3b8c r4:85864d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85828000 r8:85864d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864d00 r8:80287e08 r7:ebee1e60 r6:85864d80 r5:85828000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee5fb0 to 0xebee5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872c80
INFO: task kworker/1:885:5748 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c8f14000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:886:5750 blocked for more than 473 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:886   state:D stack:0     pid:5750  tgid:5750  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebee9d84 r8:00000002 r7:60000113 r6:ebee9d8c r5:85828c00
 r4:85828c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85828c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845eeac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fc38c r4:857fc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fc38c r4:85864e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85828c00 r8:85864e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864e00 r8:80287e08 r7:ebee1e60 r6:85864e80 r5:85828c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebee9fb0 to 0xebee9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872e00
INFO: task kworker/1:886:5750 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c9564000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:887:5752 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:887   state:D stack:0     pid:5752  tgid:5752  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebeedd84 r8:00000002 r7:60000113 r6:ebeedd8c r5:85829800
 r4:85829800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85829800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85862fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fc78c r4:857fc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fc78c r4:85864f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85829800 r8:85864f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85864f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85864f00 r8:80287e08 r7:ebee9e60 r6:85864f80 r5:85829800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebeedfb0 to 0xebeedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872e40
INFO: task kworker/1:887:5752 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c9564000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:888:5753 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:888   state:D stack:0     pid:5753  tgid:5753  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebd51d84 r8:00000002 r7:60000113 r6:ebd51d8c r5:8582a400
 r4:8582a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fcb8c r4:857fc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fcb8c r4:85887000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582a400 r8:8588702c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887000 r8:80287e08 r7:ebeede60 r6:85887080 r5:8582a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebd51fb0 to 0xebd51ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85872e40
INFO: task kworker/1:888:5753 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c982e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
 r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace: 
 r4:8582b000
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r4:00000000
 r5:00001000 r4:eb899000
 r5:857fcf8c r4:857fcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fcf8c r4:85887100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582b000 r8:8588712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887100 r8:80287e08 r7:ebd51e60 r6:85887180 r5:8582b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebef1fb0 to 0xebef1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85889080
INFO: task kworker/1:889:5756 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c982e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:890:5758 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:890   state:D stack:0     pid:5758  tgid:5758  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf05d84 r8:00000002 r7:60000113 r6:ebf05d8c r5:858cec00
 r4:858cec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858cec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf05e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fd38c r4:857fd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fd38c r4:85887200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858cec00 r8:8588722c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887200 r8:80287e08 r7:ebef1e60 r6:85858900 r5:858cec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf05fb0 to 0xebf05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:858891c0
INFO: task kworker/1:890:5758 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c9b70000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:891:5760 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:891   state:D stack:0     pid:5760  tgid:5760  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf0dd84 r8:00000002 r7:60000013 r6:ebf0dd8c r5:84673c00
 r4:84673c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84673c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858895c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84673c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb90f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fd78c r4:857fd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fd78c r4:85887280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84673c00 r8:858872ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887280 r8:80287e08 r7:ebf05e60 r6:85858980 r5:84673c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf0dfb0 to 0xebf0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85889240
INFO: task kworker/1:891:5760 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   c9c94000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace: 
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf11e08
 r5:857fdb8c r4:857fd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fdb8c r4:85887300
Exception stack(0xebf11fb0 to 0xebf11ff8)
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:8580038c r4:85800000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ca2c8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:894:5765 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:894   state:D stack:0     pid:5765  tgid:5765  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf21d84 r8:00000002 r7:60000113 r6:ebf21d8c r5:8464a400
 r4:8464a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8464a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r4:00000000
 r4:00000000
 r5:857fdf8c r4:857fdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fdf8c r4:85887400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8464a400 r8:8588742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0:                                     00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ca58b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:895:5767 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:895   state:D stack:0     pid:5767  tgid:5767  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf29d84 r8:00000002 r7:60000113 r6:ebf29d8c r5:84649800
 r4:84649800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84649800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf29e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84649800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb979000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fe38c r4:857fe000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fe38c r4:85887480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84649800 r8:858874ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85887480 r8:80287e08 r7:ebf19e60 r6:85858b80 r5:84649800
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:852bd78c r4:852bd400
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
 r5:84648000 r4:8291a680
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:857fe78c r4:857fe400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fe78c r4:85887500
 r10:61c88647 r9:84648000 r8:8588752c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   caa99000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:897:5771 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:897   state:D stack:0     pid:5771  tgid:5771  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf39d84 r8:00000002 r7:60000013 r6:ebf39d8c r5:8464b000
 r4:8464b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8464b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8464b000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857feb8c r4:857fe800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857feb8c r4:85887580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8464b000 r8:858875ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887580 r8:80287e08 r7:ebf19e60 r6:85858c80 r5:8464b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf39fb0 to 0xebf39ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85889940
INFO: task kworker/1:897:5771 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cacbc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r10:8291a684 r9:ebf41d84 r8:00000002 r7:60000113 r6:ebf41d8c r5:8464bc00
 r4:00000000
 r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ff38c r4:857ff000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:8464bc00 r8:8588762c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   caf07000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:899:5776 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:899   state:D stack:0     pid:5776  tgid:5776  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf49d84 r8:00000002 r7:60000113 r6:ebf49d8c r5:8464d400
 r4:8464d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8464d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf49e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889f00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8464d400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857ff78c r4:857ff400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857ff78c r4:85887680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8464d400 r8:858876ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fa0:                                     00000000 00000000 00000000 00000000
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:82ac21e4
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
 r4:00000001
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:8464c800 r4:8291a680
 r4:00000000
 r4:00000000
 r5:00001000 r4:ebb87000
 r5:857ffb8c r4:857ff800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cb45c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:901:5780 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:901   state:D stack:0     pid:5780  tgid:5780  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf61d84 r8:00000002 r7:60000013 r6:ebf61d8c r5:8464e000
 r4:8464e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8464e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf61e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859160c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8464e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebba1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:857fff8c r4:857ffc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:857fff8c r4:85887780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8464e000 r8:858877ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85887780 r8:80287e08 r7:ebf19e60 r6:85858e80 r5:8464e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf61fb0 to 0xebf61ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85916040
INFO: task kworker/1:901:5780 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cb83a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:902:5783 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:902   state:D stack:0     pid:5783  tgid:5783  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf91d84 r8:00000002 r7:60000113 r6:ebf91d8c r5:858d8c00
 r4:858d8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858d8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf91e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580138c r4:85801000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580138c r4:85887800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858d8c00 r8:8588782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887800 r8:80287e08 r7:ebf19e60 r6:85858f00 r5:858d8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
 r4:858da400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf99e08
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8580078c r4:85800400
 r7:ddde2d80 r6:83018200 r5:8580078c r4:85887880
 r10:61c88647 r9:858da400 r8:858878ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887880 r8:80287e08 r7:ebf91e60 r6:85858f80 r5:858da400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf99fb0 to 0xebf99ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85916280
INFO: task kworker/1:903:5785 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cc7fc000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:85800b8c r4:85800800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85800b8c r4:85887900
 r4:85887900
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r5:00001000 r4:ebcb1000
 r5:85800f8c r4:85800c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85800f8c r4:85887980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858d9800 r8:858879ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887980 r8:80287e08 r7:ebf91e60 r6:85925080 r5:858d9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfa5fb0 to 0xebfa5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85916380
INFO: task kworker/1:905:5788 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ccab7000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
INFO: task kworker/1:906:5790 blocked for more than 474 seconds.
 r4:858dc800
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfb5e08
 r4:00000000
 r5:85801b8c r4:85801800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85801b8c r4:85887a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858dc800 r8:85887a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ccfb5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:907:5792 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:907   state:D stack:0     pid:5792  tgid:5792  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebfadd84 r8:00000002 r7:60000113 r6:ebfadd8c r5:858dbc00
 r4:858dbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858dbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8580178c r4:85801400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580178c r4:85887a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85887a80
dfa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xeaf29d28 to 0xeaf29d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:908:5794 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:908   state:D stack:0     pid:5794  tgid:5794  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebfc1d84 r8:00000002 r7:60000113 r6:ebfc1d8c r5:858db000
 r4:858db000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858db000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfc1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85801f8c r4:85801c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85801f8c r4:85887b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858db000 r8:85887b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887b00 r8:80287e08 r7:ebfb5e60 r6:85925200 r5:858db000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfc1fb0 to 0xebfc1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859167c0
INFO: task kworker/1:908:5794 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cd570000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r5:00001000 r4:dfd17000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r4:858dec00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfcde08
 r4:00000000
 r5:8580238c r4:85802000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580238c r4:85887b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858dec00 r8:85887bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85887b80 r8:80287e08 r7:ebfc1e60 r6:85925280 r5:858dec00
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cd83c000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r4:858dd400
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfd1e08
 r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
 r5:8580338c r4:85803000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580338c r4:85887c00
 r10:61c88647 r9:858dd400 r8:85887c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85887c00 r8:80287e08 r7:ebfcde60 r6:85925300 r5:858dd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfd1fb0 to 0xebfd1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85916cc0
INFO: task kworker/1:910:5798 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cd9d5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:911:5800 blocked for more than 474 seconds.
 r10:8291a684 r9:ebde9d84 r8:00000002 r7:60000013 r6:ebde9d8c r5:858de000
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916ec0
 r5:8580278c r4:85802400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580278c r4:85887c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858de000 r8:85887cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887c80
 r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace: 
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:912:5802 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:912   state:D stack:0     pid:5802  tgid:5802  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebfbdd84 r8:00000002 r7:60000013 r6:ebfbdd8c r5:8582c800
 r4:8582c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfbde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587b440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb249000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85802b8c r4:85802800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85802b8c r4:85887d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582c800 r8:85887d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887d00 r8:80287e08 r7:ebfd1e60 r6:85887d80 r5:8582c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfbdfb0 to 0xebfbdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85916c80
INFO: task kworker/1:912:5802 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cdec1000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:420:5804 blocked for more than 474 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:420   state:D stack:0     pid:5804  tgid:5804  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebdf5d84 r8:00000002 r7:60000113 r6:ebdf5d8c r5:8464ec00
 r4:8464ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8464ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdf5e08
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
 r5:84b6a78c r4:84b6a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6a78c r4:85925400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8464ec00 r8:8592542c r7:82804d40 r6:dddced80 r5:dddceda0
5fa0:                                     00000000 00000000 00000000 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8591cd40
INFO: task kworker/0:420:5804 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ce0de000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
 r4:852cfa40
Workqueue: events bpf_prog_free_deferred
 r5:858cbc00 r4:8291a680
 r4:00000000
 r4:00000000
 r5:84b6a38c r4:84b6a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6a38c r4:85925500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858cbc00 r8:8592552c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85925500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85925500 r8:80287e08 r7:ebce5e60 r6:85925580 r5:858cbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebdf9fb0 to 0xebdf9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8591cb00
INFO: task kworker/0:421:5807 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ce5ba000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r5:850c9800 r4:8291a680
 r4:00000000
 r4:00000000
 r5:00001000 r4:eb3d5000
 r5:85802f8c r4:85802c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85802f8c r4:85887e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r4:85887e00
Exception stack(0xebe25fb0 to 0xebe25ff8)
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   ce77e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:914:5812 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:914   state:D stack:0     pid:5812  tgid:5812  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe3dd84 r8:00000002 r7:60000113 r6:ebe3dd8c r5:850c8c00
 r4:850c8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850c8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe3de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928900
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb851000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580478c r4:85804400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580478c r4:85887e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850c8c00 r8:85887eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887e80 r8:80287e08 r7:ebfd1e60 r6:85925680 r5:850c8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe3dfb0 to 0xebe3dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928240
INFO: task kworker/1:914:5812 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cf270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:850ca400 r4:8291a680
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:8580378c r4:85803400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580378c r4:85887f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850ca400 r8:85887f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887f00 r8:80287e08 r7:ebe3de60 r6:85925700 r5:850ca400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe41fb0 to 0xebe41ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928240
INFO: task kworker/1:915:5813 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cf270000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:916:5815 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:916   state:D stack:0     pid:5815  tgid:5815  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe55d84 r8:00000002 r7:60000113 r6:ebe55d8c r5:850c8000
 r4:850c8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850c8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe55e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85803b8c r4:85803800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85803b8c r4:85887f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850c8000 r8:85887fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85887f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85887f80 r8:80287e08 r7:ebe3de60 r6:85925780 r5:850c8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe55fb0 to 0xebe55ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928100
INFO: task kworker/1:916:5815 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cf6d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:917:5817 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:917   state:D stack:0     pid:5817  tgid:5817  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:850cc800 r4:8291a680
 r4:00000000
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928580
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85803f8c r4:85803c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85803f8c r4:85930000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850cc800 r8:8593002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930000 r8:80287e08 r7:ebe3de60 r6:85925800 r5:850cc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe65fb0 to 0xebe65ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928300
INFO: task kworker/1:917:5817 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cf6d9000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
      Not tainted 6.15.0-rc7-syzkaller #0
Call trace: 
 r5:850cb000 r4:8291a680
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe01e08
 r4:00000000
 r5:00001000 r4:eb709000
 r5:84b69f8c r4:84b69c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b69f8c r4:85925880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850cb000 r8:859258ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:85925880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85925880 r8:80287e08 r7:ebce5e60 r6:85925900 r5:850cb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe01fb0 to 0xebe01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85937280
INFO: task kworker/0:422:5820 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cf76d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
INFO: task kworker/0:423:5822 blocked for more than 475 seconds.
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r5:858b438c r4:858b4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r10:61c88647 r9:850cd400 r8:859259ac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r5:852bd78c r4:852bd400
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:918:5823 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:918   state:D stack:0     pid:5823  tgid:5823  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe71d84 r8:00000002 r7:60000113 r6:ebe71d8c r5:850ce000
 r4:850ce000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850ce000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe71e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85937680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b69b8c r4:84b69800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:84b69b8c r4:85930080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850ce000 r8:859300ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930080 r8:80287e08 r7:ebe3de60 r6:85925a80 r5:850ce000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe71fb0 to 0xebe71ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859285c0
INFO: task kworker/1:918:5823 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r4:00000000
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r5:852bd78c r4:852bd400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r4:852cfa40
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 r5:850cec00 r4:8291a680
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r5:8580438c r4:85804000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580438c r4:85930100
 r10:61c88647 r9:850cec00 r8:8593012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0:                                     00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   cff58000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:920:5828 blocked for more than 475 seconds.
 r10:8291a684 r9:ebea1d84 r8:00000002 r7:60000013 r6:ebea1d8c r5:858f0c00
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
 r5:85804b8c r4:85804800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85804b8c r4:85930180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f0c00 r8:859301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r10:00000000 r9:85930180 r8:80287e08 r7:ebe3de60 r6:85925b80 r5:858f0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebea1fb0 to 0xebea1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928780
INFO: task kworker/1:920:5828 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d0118000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:921:5830 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:921   state:D stack:0     pid:5830  tgid:5830  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebfd9d84 r8:00000002 r7:60000113 r6:ebfd9d8c r5:858f2400
 r4:858f2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r4:00000000
 r4:00000000
 r5:00001000 r4:eba5b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85804f8c r4:85804c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85804f8c r4:85930200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f2400 r8:8593022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930200 r8:80287e08 r7:ebea1e60 r6:85925c00 r5:858f2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfd9fb0 to 0xebfd9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859288c0
INFO: task kworker/1:921:5830 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d02f6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:922:5831 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:922   state:D stack:0     pid:5831  tgid:5831  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r5:858f0000 r4:8291a680
 r9:83018205 r8:858f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
 r5:8580578c r4:85805400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xebfddfb0 to 0xebfddff8)
 r4:00000000
9d60: 80230ad0 80239bb0 80070113 ffffffff
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
Workqueue: events bpf_prog_free_deferred
 r4:00000000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba7b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580538c r4:85805000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580538c r4:85930300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f1800 r8:8593032c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930300 r8:80287e08 r7:ebfdde60 r6:85925d00 r5:858f1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfedfb0 to 0xebfedff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:859289c0
INFO: task kworker/1:923:5833 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d08c8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:924:5835 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:924   state:D stack:0     pid:5835  tgid:5835  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebff5d84 r8:00000002 r7:60000113 r6:ebff5d8c r5:858f3000
 r4:858f3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebff5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
 r5:85805b8c r4:85805800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85805b8c r4:85930380
 r10:61c88647 r9:858f3000 r8:859303ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebff5fb0 to 0xebff5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928b80
INFO: task kworker/1:924:5835 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d0b63000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
INFO: task kworker/1:925:5837 blocked for more than 475 seconds.
 r10:8291a684 r9:ebffdd84 r8:00000002 r7:60000113 r6:ebffdd8c r5:858f3c00
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebffde08
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580638c r4:85806000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580638c r4:85930400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f3c00 r8:8593042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930400 r8:80287e08 r7:ebff5e60 r6:85925e00 r5:858f3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebffdfb0 to 0xebffdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928c80
INFO: task kworker/1:925:5837 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d0f62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:926:5839 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:926   state:D stack:0     pid:5839  tgid:5839  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
 r10:8291a684 r9:ec005d84 r8:00000002 r7:60000113 r6:ec005d8c r5:858f4800
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85916f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85805f8c r4:85805c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85805f8c r4:85930480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f4800 r8:859304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930480 r8:80287e08 r7:ebffde60 r6:85925e80 r5:858f4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec005fb0 to 0xec005ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928e00
INFO: task kworker/1:926:5839 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d0f62000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:927:5841 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:927   state:D stack:0     pid:5841  tgid:5841  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec00dd84 r8:00000002 r7:60000113 r6:ec00dd8c r5:858f5400
 r4:858f5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec00de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580678c r4:85806400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580678c r4:85930500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f5400 r8:8593052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930500 r8:80287e08 r7:ebffde60 r6:85925f00 r5:858f5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec00dfb0 to 0xec00dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:85928e00
INFO: task kworker/1:927:5841 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d14cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:928:5843 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:928   state:D stack:0     pid:5843  tgid:5843  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec015d84 r8:00000002 r7:60000113 r6:ec015d8c r5:858f6000
 r4:858f6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec015e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaded000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580738c r4:85807000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580738c r4:85930580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f6000 r8:859305ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930580 r8:80287e08 r7:ec00de60 r6:85925f80 r5:858f6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec015fb0 to 0xec015ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8591c440
INFO: task kworker/1:928:5843 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d14cf000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:929:5845 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:929   state:D stack:0     pid:5845  tgid:5845  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec01dd84 r8:00000002 r7:60000113 r6:ec01dd8c r5:858f6c00
 r4:858f6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec01de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587b240
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfaf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85806b8c r4:85806800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85806b8c r4:85930600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f6c00 r8:8593062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930600 r8:80287e08 r7:ec015e60 r6:849ed000 r5:858f6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec01dfb0 to 0xec01dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8591c140
INFO: task kworker/1:929:5845 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d179f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:424:5847 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:424   state:D stack:0     pid:5847  tgid:5847  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec019d84 r8:00000002 r7:60000113 r6:ec019d8c r5:850d0000
 r4:850d0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec019e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb3c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b478c r4:858b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b478c r4:849ed080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d0000 r8:849ed0ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:849ed080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:849ed080 r8:80287e08 r7:ebce5e60 r6:849ed100 r5:850d0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec019fb0 to 0xec019ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849eb280
INFO: task kworker/0:424:5847 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d1a06000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:930:5850 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:930   state:D stack:0     pid:5850  tgid:5850  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf1dd84 r8:00000002 r7:60000113 r6:ebf1dd8c r5:8582ec00
 r4:8582ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf1de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0947000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85806f8c r4:85806c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85806f8c r4:85930680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582ec00 r8:859306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930680 r8:80287e08 r7:ec015e60 r6:85930700 r5:8582ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf1dfb0 to 0xebf1dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8587b040
INFO: task kworker/1:930:5850 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d1c64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:425:5853 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:425   state:D stack:0     pid:5853  tgid:5853  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebf4dd84 r8:00000002 r7:60000113 r6:ebf4dd8c r5:850d2400
 r4:850d2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf4de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ebe00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b4f8c r4:858b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b4f8c r4:849ed180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d2400 r8:849ed1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:849ed180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:849ed180 r8:80287e08 r7:ebce5e60 r6:849ed200 r5:850d2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebf4dfb0 to 0xebf4dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849eb4c0
INFO: task kworker/0:425:5853 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d20f8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:931:5855 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:931   state:D stack:0     pid:5855  tgid:5855  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec021d84 r8:00000002 r7:60000013 r6:ec021d8c r5:850d1800
 r4:850d1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec021e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722840
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb56f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580838c r4:85808000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580838c r4:85930780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d1800 r8:859307ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930780 r8:80287e08 r7:ec015e60 r6:849ed280 r5:850d1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec021fb0 to 0xec021ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722380
INFO: task kworker/1:931:5855 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d266e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:932:5857 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:932   state:D stack:0     pid:5857  tgid:5857  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec029d84 r8:00000002 r7:60000113 r6:ec029d8c r5:850d3c00
 r4:850d3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec029e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb103000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580778c r4:85807400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580778c r4:85930800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d3c00 r8:8593082c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930800 r8:80287e08 r7:ec021e60 r6:849ed300 r5:850d3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec029fb0 to 0xec029ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722380
INFO: task kworker/1:932:5857 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d266e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:933:5858 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:933   state:D stack:0     pid:5858  tgid:5858  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec039d84 r8:00000002 r7:60000013 r6:ec039d8c r5:850d4800
 r4:850d4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec039e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb357000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85807b8c r4:85807800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85807b8c r4:85930880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d4800 r8:859308ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930880 r8:80287e08 r7:ec021e60 r6:849ed380 r5:850d4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec039fb0 to 0xec039ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722180
INFO: task kworker/1:933:5858 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d27a4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:934:5860 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:934   state:D stack:0     pid:5860  tgid:5860  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec041d84 r8:00000002 r7:60000013 r6:ec041d8c r5:850d5400
 r4:850d5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec041e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb4df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85807f8c r4:85807c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85807f8c r4:85930900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d5400 r8:8593092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930900 r8:80287e08 r7:ec021e60 r6:849ed400 r5:850d5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec041fb0 to 0xec041ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847223c0
INFO: task kworker/1:934:5860 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d2a89000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:935:5862 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:935   state:D stack:0     pid:5862  tgid:5862  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec045d84 r8:00000002 r7:60000113 r6:ec045d8c r5:850d0c00
 r4:850d0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec045e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85808f8c r4:85808c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85808f8c r4:85930980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d0c00 r8:859309ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930980 r8:80287e08 r7:ec021e60 r6:849ed480 r5:850d0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec045fb0 to 0xec045ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847226c0
INFO: task kworker/1:935:5862 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d2a89000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:426:5866 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:426   state:D stack:0     pid:5866  tgid:5866  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebe85d84 r8:00000002 r7:60000113 r6:ebe85d8c r5:850d6000
 r4:850d6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe85e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b538c r4:858b5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b538c r4:849ed500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d6000 r8:849ed52c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:849ed500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:849ed500 r8:80287e08 r7:ebce5e60 r6:849ed580 r5:850d6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe85fb0 to 0xebe85ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849ebc80
INFO: task kworker/0:426:5866 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d3239000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:936:5867 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:936   state:D stack:0     pid:5867  tgid:5867  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec049d84 r8:00000002 r7:60000113 r6:ec049d8c r5:850d6c00
 r4:850d6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec049e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847229c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb78f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580878c r4:85808400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580878c r4:85930a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d6c00 r8:85930a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930a00 r8:80287e08 r7:ec045e60 r6:849ed600 r5:850d6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec049fb0 to 0xec049ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847226c0
INFO: task kworker/1:936:5867 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d3239000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:937:5868 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:937   state:D stack:0     pid:5868  tgid:5868  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec04dd84 r8:00000002 r7:60000013 r6:ec04dd8c r5:850d3000
 r4:850d3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850d3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec04de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722ac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb887000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85808b8c r4:85808800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85808b8c r4:85930a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850d3000 r8:85930aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930a80 r8:80287e08 r7:ec045e60 r6:849ed680 r5:850d3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec04dfb0 to 0xec04dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847228c0
INFO: task kworker/1:937:5868 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d361b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:938:5871 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:938   state:D stack:0     pid:5871  tgid:5871  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec051d84 r8:00000002 r7:60000113 r6:ec051d8c r5:858f8000
 r4:858f8000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f8000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec051e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580938c r4:85809000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580938c r4:85930b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f8000 r8:85930b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930b00 r8:80287e08 r7:ec045e60 r6:849ed700 r5:858f8000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec051fb0 to 0xec051ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722a80
INFO: task kworker/1:938:5871 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d361b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:939:5872 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:939   state:D stack:0     pid:5872  tgid:5872  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebef5d84 r8:00000002 r7:60000113 r6:ebef5d8c r5:8582e000
 r4:8582e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84722780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb933000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580978c r4:85809400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580978c r4:85930b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582e000 r8:85930bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930b80 r8:80287e08 r7:ec051e60 r6:85930c00 r5:8582e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebef5fb0 to 0xebef5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722c40
INFO: task kworker/1:939:5872 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d388e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:940:5873 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:940   state:D stack:0     pid:5873  tgid:5873  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec059d84 r8:00000002 r7:60000113 r6:ec059d8c r5:8582d400
 r4:8582d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec059e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972100
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb999000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85809f8c r4:85809c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85809f8c r4:85930c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582d400 r8:85930cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930c80 r8:80287e08 r7:ebef5e60 r6:85930d00 r5:8582d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec059fb0 to 0xec059ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722940
INFO: task kworker/1:940:5873 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d3cc4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:941:5876 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:941   state:D stack:0     pid:5876  tgid:5876  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec055d84 r8:00000002 r7:60000113 r6:ec055d8c r5:8582bc00
 r4:8582bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8582bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec055e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8591c140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8582bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb967000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85809b8c r4:85809800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85809b8c r4:85930d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8582bc00 r8:85930dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930d80 r8:80287e08 r7:ec059e60 r6:85930e00 r5:8582bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec055fb0 to 0xec055ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84722fc0
INFO: task kworker/1:941:5876 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d3df4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:942:5879 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:942   state:D stack:0     pid:5879  tgid:5879  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec061d84 r8:00000002 r7:60000113 r6:ec061d8c r5:850cbc00
 r4:850cbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850cbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec061e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580a38c r4:8580a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580a38c r4:85930e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850cbc00 r8:85930eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930e80 r8:80287e08 r7:ec059e60 r6:85930f00 r5:850cbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec061fb0 to 0xec061ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972140
INFO: task kworker/1:942:5879 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d3df4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:943:5881 blocked for more than 475 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:943   state:D stack:0     pid:5881  tgid:5881  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec065d84 r8:00000002 r7:60000113 r6:ec065d8c r5:85830000
 r4:85830000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85830000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec065e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85830000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580a78c r4:8580a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580a78c r4:85930f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85830000 r8:85930fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:85930f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:85930f80 r8:80287e08 r7:ec061e60 r6:84978000 r5:85830000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec065fb0 to 0xec065ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972080
INFO: task kworker/1:943:5881 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d403b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:944:5883 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:944   state:D stack:0     pid:5883  tgid:5883  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec069d84 r8:00000002 r7:60000113 r6:ec069d8c r5:85830c00
 r4:85830c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85830c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec069e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580ab8c r4:8580a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580ab8c r4:84978080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85830c00 r8:849780ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978080 r8:80287e08 r7:ec065e60 r6:84978100 r5:85830c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec069fb0 to 0xec069ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972300
INFO: task kworker/1:944:5883 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d403b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:945:5885 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:945   state:D stack:0     pid:5885  tgid:5885  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec06dd84 r8:00000002 r7:60000113 r6:ec06dd8c r5:85831800
 r4:85831800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85831800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec06de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85831800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580af8c r4:8580ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580af8c r4:84978180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85831800 r8:849781ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978180 r8:80287e08 r7:ec069e60 r6:84978200 r5:85831800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec06dfb0 to 0xec06dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972400
INFO: task kworker/1:945:5885 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d4434000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:946:5888 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:946   state:D stack:0     pid:5888  tgid:5888  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec071d84 r8:00000002 r7:60000113 r6:ec071d8c r5:85832400
 r4:85832400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85832400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec071e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebdcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85944b8c r4:85944800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85944b8c r4:84978280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85832400 r8:849782ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978280 r8:80287e08 r7:ec06de60 r6:84978300 r5:85832400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec071fb0 to 0xec071ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972580
INFO: task kworker/1:946:5888 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d4812000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:947:5889 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:947   state:D stack:0     pid:5889  tgid:5889  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec075d84 r8:00000002 r7:60000013 r6:ec075d8c r5:85833000
 r4:85833000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85833000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec075e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849728c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85833000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebba9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580b38c r4:8580b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580b38c r4:84978380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85833000 r8:849783ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978380 r8:80287e08 r7:ec071e60 r6:84978400 r5:85833000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec075fb0 to 0xec075ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972940
INFO: task kworker/1:947:5889 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d4812000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:948:5891 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:948   state:D stack:0     pid:5891  tgid:5891  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec079d84 r8:00000002 r7:60000113 r6:ec079d8c r5:85833c00
 r4:85833c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85833c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec079e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580b78c r4:8580b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580b78c r4:84978480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85833c00 r8:849784ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978480 r8:80287e08 r7:ec071e60 r6:84978500 r5:85833c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec079fb0 to 0xec079ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972580
INFO: task kworker/1:948:5891 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d510a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:949:5893 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:949   state:D stack:0     pid:5893  tgid:5893  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec885d84 r8:00000002 r7:60000113 r6:ec885d8c r5:85834800
 r4:85834800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85834800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972c00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebca7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580bb8c r4:8580b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580bb8c r4:84978580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85834800 r8:849785ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978580 r8:80287e08 r7:ec071e60 r6:84978600 r5:85834800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec885fb0 to 0xec885ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972a80
INFO: task kworker/1:949:5893 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d510a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:950:5894 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:950   state:D stack:0     pid:5894  tgid:5894  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:85835400
 r4:85835400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85835400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972d40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85835400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebcb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8580bf8c r4:8580bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8580bf8c r4:84978680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85835400 r8:849786ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978680 r8:80287e08 r7:ec071e60 r6:84978700 r5:85835400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec889fb0 to 0xec889ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972bc0
INFO: task kworker/1:950:5894 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d544d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:951:5896 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:951   state:D stack:0     pid:5896  tgid:5896  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:85836c00
 r4:85836c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85836c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594438c r4:85944000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594438c r4:84978780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85836c00 r8:849787ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978780 r8:80287e08 r7:ec071e60 r6:84978800 r5:85836c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec88dfb0 to 0xec88dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84972bc0
INFO: task kworker/1:951:5896 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d570d000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:427:5898 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:427   state:D stack:0     pid:5898  tgid:5898  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:85838c00
 r4:85838c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85838c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec891e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebdf1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b578c r4:858b5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b578c r4:849ed780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85838c00 r8:849ed7ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:849ed780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:849ed780 r8:80287e08 r7:ebce5e60 r6:84978880 r5:85838c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec891fb0 to 0xec891ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849973c0
INFO: task kworker/0:427:5898 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d5a16000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:952:5901 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:952   state:D stack:0     pid:5901  tgid:5901  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec899d84 r8:00000002 r7:60000013 r6:ec899d8c r5:85839800
 r4:85839800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85839800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f0c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85839800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594478c r4:85944400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594478c r4:84978900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85839800 r8:8497892c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978900 r8:80287e08 r7:ec071e60 r6:84978980 r5:85839800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec899fb0 to 0xec899ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593f100
INFO: task kworker/1:952:5901 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d5a16000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:953:5903 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:953   state:D stack:0     pid:5903  tgid:5903  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec89dd84 r8:00000002 r7:60000113 r6:ec89dd8c r5:8583b000
 r4:8583b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebea5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85945f8c r4:85945c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85945f8c r4:84978a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583b000 r8:84978a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978a00 r8:80287e08 r7:ec071e60 r6:84978a80 r5:8583b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec89dfb0 to 0xec89dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593f280
INFO: task kworker/1:953:5903 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d5f6e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:428:5905 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:428   state:D stack:0     pid:5905  tgid:5905  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8a1d84 r8:00000002 r7:60000113 r6:ec8a1d8c r5:8583a400
 r4:8583a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a3e00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:8583a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b638c r4:858b6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b638c r4:849ed800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583a400 r8:849ed82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:849ed800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:849ed800 r8:80287e08 r7:ebce5e60 r6:84978b00 r5:8583a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a1fb0 to 0xec8a1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84997500
INFO: task kworker/0:428:5905 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d6310000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:954:5906 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:954   state:D stack:0     pid:5906  tgid:5906  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8a9d84 r8:00000002 r7:60000013 r6:ec8a9d8c r5:8583c800
 r4:8583c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f6c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583c800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85944f8c r4:85944c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85944f8c r4:84978b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583c800 r8:84978bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978b80 r8:80287e08 r7:ec89de60 r6:84978c00 r5:8583c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a9fb0 to 0xec8a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593f540
INFO: task kworker/1:954:5906 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d687f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:955:5908 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:955   state:D stack:0     pid:5908  tgid:5908  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8add84 r8:00000002 r7:60000113 r6:ec8add8c r5:85838000
 r4:85838000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85838000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85838000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b5b8c r4:858b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:858b5b8c r4:84978c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85838000 r8:84978cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978c80 r8:80287e08 r7:ec89de60 r6:84978d00 r5:85838000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8adfb0 to 0xec8adff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593f540
INFO: task kworker/1:955:5908 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d69b0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:956:5911 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:956   state:D stack:0     pid:5911  tgid:5911  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000013 r6:ec8a5d8c r5:8583d400
 r4:8583d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fac0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594538c r4:85945000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594538c r4:84978d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583d400 r8:84978dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978d80 r8:80287e08 r7:ec89de60 r6:84978e00 r5:8583d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8a5fb0 to 0xec8a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593f940
INFO: task kworker/1:956:5911 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d6fbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:957:5913 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:957   state:D stack:0     pid:5913  tgid:5913  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:8583e000
 r4:8583e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593f940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594578c r4:85945400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594578c r4:84978e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583e000 r8:84978eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978e80 r8:80287e08 r7:ec89de60 r6:84978f00 r5:8583e000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec895fb0 to 0xec895ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593fb00
INFO: task kworker/1:957:5913 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d6fbb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:958:5915 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:958   state:D stack:0     pid:5915  tgid:5915  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8bdd84 r8:00000002 r7:60000013 r6:ec8bdd8c r5:858fb000
 r4:858fb000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fb000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fd80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85945b8c r4:85945800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85945b8c r4:84978f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fb000 r8:84978fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84978f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84978f80 r8:80287e08 r7:ec89de60 r6:849ed880 r5:858fb000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8bdfb0 to 0xec8bdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593fb00
INFO: task kworker/1:958:5915 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d722e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:959:5916 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:959   state:D stack:0     pid:5916  tgid:5916  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:858f8c00
 r4:858f8c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f8c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972cc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebec1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594638c r4:85946000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594638c r4:8497c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f8c00 r8:8497c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c000 r8:80287e08 r7:ec89de60 r6:849ed900 r5:858f8c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8c1fb0 to 0xec8c1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593fe40
INFO: task kworker/1:959:5916 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d722e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:960:5919 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:960   state:D stack:0     pid:5919  tgid:5919  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8c9d84 r8:00000002 r7:60000013 r6:ec8c9d8c r5:858fd400
 r4:858fd400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fd400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d680
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594778c r4:85947400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594778c r4:8497c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fd400 r8:8497c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c080 r8:80287e08 r7:ec8c1e60 r6:849ed980 r5:858fd400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8c9fb0 to 0xec8c9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593ff40
INFO: task kworker/1:960:5919 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d7cae000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:961:5920 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:961   state:D stack:0     pid:5920  tgid:5920  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000113 r6:ec8cdd8c r5:858fe000
 r4:858fe000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fe000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebeff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594678c r4:85946400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594678c r4:8497c100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fe000 r8:8497c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c100 r8:80287e08 r7:ec8c9e60 r6:849eda00 r5:858fe000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8cdfb0 to 0xec8cdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8593ff80
INFO: task kworker/1:961:5920 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d8038000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:962:5922 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:962   state:D stack:0     pid:5922  tgid:5922  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000113 r6:ec8d5d8c r5:858fc800
 r4:858fc800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fc800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85946b8c r4:85946800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85946b8c r4:8497c180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fc800 r8:8497c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c180 r8:80287e08 r7:ec8c9e60 r6:849eda80 r5:858fc800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8d5fb0 to 0xec8d5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d1c0
INFO: task kworker/1:962:5922 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d82c0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:963:5924 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:963   state:D stack:0     pid:5924  tgid:5924  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8ddd84 r8:00000002 r7:60000013 r6:ec8ddd8c r5:858fec00
 r4:858fec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d400
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85946f8c r4:85946c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85946f8c r4:8497c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fec00 r8:8497c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c200 r8:80287e08 r7:ec8c9e60 r6:849edb00 r5:858fec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8ddfb0 to 0xec8ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d100
INFO: task kworker/1:963:5924 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d8349000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:964:5926 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:964   state:D stack:0     pid:5926  tgid:5926  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:8583ec00
 r4:8583ec00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583ec00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594738c r4:85947000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594738c r4:8497c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583ec00 r8:8497c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c280 r8:80287e08 r7:ec8c9e60 r6:8497c300 r5:8583ec00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8b5fb0 to 0xec8b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d200
INFO: task kworker/1:964:5926 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d87c5000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:965:5929 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:965   state:D stack:0     pid:5929  tgid:5929  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8e5d84 r8:00000002 r7:60000013 r6:ec8e5d8c r5:85836000
 r4:85836000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85836000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497d880
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebf69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85947b8c r4:85947800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85947b8c r4:8497c380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85836000 r8:8497c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c380 r8:80287e08 r7:ec8c9e60 r6:8497c400 r5:85836000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e5fb0 to 0xec8e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d3c0
INFO: task kworker/1:965:5929 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d8c66000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:966:5930 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:966   state:D stack:0     pid:5930  tgid:5930  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec05dd84 r8:00000002 r7:60000013 r6:ec05dd8c r5:85980c00
 r4:85980c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85980c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec05de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497da00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df83b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85947f8c r4:85947c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85947f8c r4:8497c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85980c00 r8:8497c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c480 r8:80287e08 r7:ec8e5e60 r6:8497c500 r5:85980c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec05dfb0 to 0xec05dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d580
INFO: task kworker/1:966:5930 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d8f64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:967:5933 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:967   state:D stack:0     pid:5933  tgid:5933  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ebfc5d84 r8:00000002 r7:60000113 r6:ebfc5d8c r5:858fa400
 r4:858fa400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fa400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebfc5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497db80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaa9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594838c r4:85948000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594838c r4:8497c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fa400 r8:8497c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c580 r8:80287e08 r7:ec05de60 r6:849edb80 r5:858fa400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebfc5fb0 to 0xebfc5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d580
INFO: task kworker/1:967:5933 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d90cb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:968:5934 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:968   state:D stack:0     pid:5934  tgid:5934  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8e9d84 r8:00000002 r7:60000113 r6:ec8e9d8c r5:858f9800
 r4:858f9800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858f9800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dc40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eaf01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594878c r4:85948400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594878c r4:8497c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858f9800 r8:8497c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c600 r8:80287e08 r7:ebfc5e60 r6:849edc00 r5:858f9800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e9fb0 to 0xec8e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497d780
INFO: task kworker/1:968:5934 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9345000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:969:5937 blocked for more than 476 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:969   state:D stack:0     pid:5937  tgid:5937  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:84b00c00
 r4:84b00c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b00c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497ddc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb213000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85948b8c r4:85948800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85948b8c r4:8497c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b00c00 r8:8497c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c680 r8:80287e08 r7:ec8e9e60 r6:849edc80 r5:84b00c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8f5fb0 to 0xec8f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497dac0
INFO: task kworker/1:969:5937 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d955b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:970:5939 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:970   state:D stack:0     pid:5939  tgid:5939  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8fdd84 r8:00000002 r7:60000113 r6:ec8fdd8c r5:84b02400
 r4:84b02400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b02400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dbc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b02400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb3d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85948f8c r4:85948c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85948f8c r4:8497c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b02400 r8:8497c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c700 r8:80287e08 r7:ec8f5e60 r6:849edd00 r5:84b02400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8fdfb0 to 0xec8fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497dbc0
INFO: task kworker/1:970:5939 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9678000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:971:5940 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:971   state:D stack:0     pid:5940  tgid:5940  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:84b03000
 r4:84b03000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b03000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4040
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b03000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb68d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85949b8c r4:85949800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85949b8c r4:8497c780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b03000 r8:8497c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c780 r8:80287e08 r7:ec8fde60 r6:849edd80 r5:84b03000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec901fb0 to 0xec901ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497dbc0
INFO: task kworker/1:971:5940 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9937000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:972:5942 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:972   state:D stack:0     pid:5942  tgid:5942  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec909d84 r8:00000002 r7:60000113 r6:ec909d8c r5:84b01800
 r4:84b01800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b01800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997c80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b01800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb453000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594938c r4:85949000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594938c r4:8497c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b01800 r8:8497c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c800 r8:80287e08 r7:ec901e60 r6:849ede00 r5:84b01800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec909fb0 to 0xec909ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497dd80
INFO: task kworker/1:972:5942 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9b64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:973:5944 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:973   state:D stack:0     pid:5944  tgid:5944  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec911d84 r8:00000002 r7:60000113 r6:ec911d8c r5:84b00000
 r4:84b00000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b00000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593fe40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b00000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb5ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594978c r4:85949400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594978c r4:8497c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b00000 r8:8497c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c880 r8:80287e08 r7:ec901e60 r6:849ede80 r5:84b00000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec911fb0 to 0xec911ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84997a00
INFO: task kworker/1:973:5944 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9d57000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:974:5947 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:974   state:D stack:0     pid:5947  tgid:5947  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec90dd84 r8:00000002 r7:60000113 r6:ec90dd8c r5:85982400
 r4:85982400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85982400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4380
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85982400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb6ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85949f8c r4:85949c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85949f8c r4:8497c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85982400 r8:8497c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497c900 r8:80287e08 r7:ec901e60 r6:8497c980 r5:85982400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec90dfb0 to 0xec90dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4100
INFO: task kworker/1:974:5947 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   d9f9a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:975:5949 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:975   state:D stack:0     pid:5949  tgid:5949  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:85983c00
 r4:85983c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85983c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594a38c r4:8594a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594a38c r4:8497ca00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85983c00 r8:8497ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497ca00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497ca00 r8:80287e08 r7:ec90de60 r6:8497ca80 r5:85983c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8e1fb0 to 0xec8e1ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4200
INFO: task kworker/1:975:5949 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   da2c4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:976:5951 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:976   state:D stack:0     pid:5951  tgid:5951  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec919d84 r8:00000002 r7:60000013 r6:ec919d8c r5:85983000
 r4:85983000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85983000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4740
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85983000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb837000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594a78c r4:8594a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594a78c r4:8497cb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85983000 r8:8497cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497cb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497cb00 r8:80287e08 r7:ec8e1e60 r6:8497cb80 r5:85983000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec919fb0 to 0xec919ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a40c0
INFO: task kworker/1:976:5951 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   da4be000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:977:5952 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:977   state:D stack:0     pid:5952  tgid:5952  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:84b03c00
 r4:84b03c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b03c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4980
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594af8c r4:8594ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594af8c r4:8497cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b03c00 r8:8497cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497cc00 r8:80287e08 r7:ec919e60 r6:849edf00 r5:84b03c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec91dfb0 to 0xec91dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a40c0
INFO: task kworker/1:977:5952 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   da784000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:978:5955 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:978   state:D stack:0     pid:5955  tgid:5955  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec929d84 r8:00000002 r7:60000013 r6:ec929d8c r5:84b06c00
 r4:84b06c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b06c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec929e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594ab8c r4:8594a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594ab8c r4:8497cc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b06c00 r8:8497ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497cc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497cc80 r8:80287e08 r7:ec91de60 r6:849edf80 r5:84b06c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec929fb0 to 0xec929ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4680
INFO: task kworker/1:978:5955 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   daa64000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:979:5956 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:979   state:D stack:0     pid:5956  tgid:5956  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec925d84 r8:00000002 r7:60000013 r6:ec925d8c r5:85985400
 r4:85985400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85985400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85985400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eba83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594b38c r4:8594b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594b38c r4:8497cd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85985400 r8:8497cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497cd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497cd00 r8:80287e08 r7:ec91de60 r6:8497cd80 r5:85985400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec925fb0 to 0xec925ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4780
INFO: task kworker/1:979:5956 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dad0a000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:980:5958 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:980   state:D stack:0     pid:5958  tgid:5958  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec8edd84 r8:00000002 r7:60000113 r6:ec8edd8c r5:85986000
 r4:85986000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85986000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4fc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85986000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc53000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594bb8c r4:8594b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594bb8c r4:8497ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85986000 r8:8497ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497ce00 r8:80287e08 r7:ec925e60 r6:8497ce80 r5:85986000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec8edfb0 to 0xec8edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a49c0
INFO: task kworker/1:980:5958 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dafd8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:981:5961 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:981   state:D stack:0     pid:5961  tgid:5961  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:85980000
 r4:85980000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85980000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a4ec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85980000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594b78c r4:8594b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594b78c r4:8497cf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85980000 r8:8497cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8497cf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8497cf00 r8:80287e08 r7:ec8ede60 r6:8497cf80 r5:85980000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec931fb0 to 0xec931ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4bc0
INFO: task kworker/1:981:5961 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   db3e8000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:982:5964 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:982   state:D stack:0     pid:5964  tgid:5964  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:85981800
 r4:85981800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85981800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497dec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85981800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebc6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8594bf8c r4:8594bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8594bf8c r4:84aa1000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85981800 r8:84aa102c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1000 r8:80287e08 r7:ec8ede60 r6:84aa1080 r5:85981800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec92dfb0 to 0xec92dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a4dc0
INFO: task kworker/1:982:5964 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   db6ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:983:5966 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:983   state:D stack:0     pid:5966  tgid:5966  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:85984800
 r4:85984800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85984800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84997a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85984800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595038c r4:85950000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595038c r4:84aa1100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85984800 r8:84aa112c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1100 r8:80287e08 r7:ec92de60 r6:84aa1180 r5:85984800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec935fb0 to 0xec935ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:8497dfc0
INFO: task kworker/1:983:5966 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   db6ac000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:984:5968 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:984   state:D stack:0     pid:5968  tgid:5968  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85986c00
 r4:85986c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85986c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223140
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebde3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595078c r4:85950400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595078c r4:84aa1200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85986c00 r8:84aa122c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1200 r8:80287e08 r7:ec935e60 r6:84aa1280 r5:85986c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec939fb0 to 0xec939ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849971c0
INFO: task kworker/1:984:5968 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dbacd000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:985:5970 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:985   state:D stack:0     pid:5970  tgid:5970  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec93dd84 r8:00000002 r7:60000113 r6:ec93dd8c r5:8583bc00
 r4:8583bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:8583bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223300
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:8583bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85950b8c r4:85950800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85950b8c r4:84aa1300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:8583bc00 r8:84aa132c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1300 r8:80287e08 r7:ec939e60 r6:84aa1380 r5:8583bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec93dfb0 to 0xec93dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223080
INFO: task kworker/1:985:5970 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dbc20000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:986:5972 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:986   state:D stack:0     pid:5972  tgid:5972  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec941d84 r8:00000002 r7:60000113 r6:ec941d8c r5:85840000
 r4:85840000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85840000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223500
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85840000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85950f8c r4:85950c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85950f8c r4:84aa1400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85840000 r8:84aa142c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1400 r8:80287e08 r7:ec93de60 r6:84aa1480 r5:85840000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec941fb0 to 0xec941ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223180
INFO: task kworker/1:986:5972 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dbd13000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:987:5973 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:987   state:D stack:0     pid:5973  tgid:5973  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec921d84 r8:00000002 r7:60000113 r6:ec921d8c r5:85840c00
 r4:85840c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85840c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223600
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebef7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595138c r4:85951000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595138c r4:84aa1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85840c00 r8:84aa152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1500 r8:80287e08 r7:ec941e60 r6:84aa1580 r5:85840c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec921fb0 to 0xec921ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223180
INFO: task kworker/1:987:5973 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dbef0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:988:5976 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:988   state:D stack:0     pid:5976  tgid:5976  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec945d84 r8:00000002 r7:60000113 r6:ec945d8c r5:85841800
 r4:85841800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85841800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842237c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85841800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebfa9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595178c r4:85951400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595178c r4:84aa1600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85841800 r8:84aa162c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1600 r8:80287e08 r7:ec921e60 r6:84aa1680 r5:85841800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec945fb0 to 0xec945ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223400
INFO: task kworker/1:988:5976 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dc1c4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:989:5979 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:989   state:D stack:0     pid:5979  tgid:5979  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:85842400
 r4:85842400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85842400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec94de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842238c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85842400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebfc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85951b8c r4:85951800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85951b8c r4:84aa1700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85842400 r8:84aa172c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1700 r8:80287e08 r7:ec945e60 r6:84aa1780 r5:85842400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec94dfb0 to 0xec94dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223640
INFO: task kworker/1:989:5979 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dc461000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:990:5980 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:990   state:D stack:0     pid:5980  tgid:5980  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:85843000
 r4:85843000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85843000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223a80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85843000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebfe1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85951f8c r4:85951c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85951f8c r4:84aa1800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85843000 r8:84aa182c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1800 r8:80287e08 r7:ec94de60 r6:84aa1880 r5:85843000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec951fb0 to 0xec951ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223640
INFO: task kworker/1:990:5980 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dc705000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:991:5981 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:991   state:D stack:0     pid:5981  tgid:5981  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:85844800
 r4:85844800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85844800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223f40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595278c r4:85952400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595278c r4:84aa1900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85844800 r8:84aa192c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1900 r8:80287e08 r7:ec951e60 r6:84aa1980 r5:85844800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec949fb0 to 0xec949ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223640
INFO: task kworker/1:991:5981 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dcfe0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:429:5984 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:429   state:D stack:0     pid:5984  tgid:5984  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec955d84 r8:00000002 r7:60000113 r6:ec955d8c r5:84b05400
 r4:84b05400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b05400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a3800
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b05400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec02d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b678c r4:858b6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b678c r4:8479b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b05400 r8:8479b02c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479b000 r8:80287e08 r7:ebce5e60 r6:8479b080 r5:84b05400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec955fb0 to 0xec955ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a3e80
INFO: task kworker/0:429:5984 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dcfe0000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:992:5985 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:992   state:D stack:0     pid:5985  tgid:5985  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec95dd84 r8:00000002 r7:60000013 r6:ec95dd8c r5:84b06000
 r4:84b06000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b06000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223dc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b06000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec009000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595238c r4:85952000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595238c r4:84aa1a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b06000 r8:84aa1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1a00 r8:80287e08 r7:ec949e60 r6:8479b100 r5:84b06000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec95dfb0 to 0xec95dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223900
INFO: task kworker/1:992:5985 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dd3fe000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:430:5988 blocked for more than 477 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:430   state:D stack:0     pid:5988  tgid:5988  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec959d84 r8:00000002 r7:60000113 r6:ec959d8c r5:84b04800
 r4:84b04800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b04800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2200
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b04800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b6b8c r4:858b6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b6b8c r4:8479b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b04800 r8:8479b1ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479b180 r8:80287e08 r7:ebce5e60 r6:8479b200 r5:84b04800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec959fb0 to 0xec959ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:849a3c80
INFO: task kworker/0:430:5988 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dd86b000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:993:5990 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:993   state:D stack:0     pid:5990  tgid:5990  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec96dd84 r8:00000002 r7:60000013 r6:ec96dd8c r5:858fbc00
 r4:858fbc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:858fbc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84223a00
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:858fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85952b8c r4:85952800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85952b8c r4:84aa1a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:858fbc00 r8:84aa1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1a80 r8:80287e08 r7:ec949e60 r6:8479b280 r5:858fbc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec96dfb0 to 0xec96dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223d00
INFO: task kworker/1:993:5990 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   de206000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:994:5992 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:994   state:D stack:0     pid:5992  tgid:5992  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:850e0000
 r4:850e0000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e0000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc180
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec975000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85952f8c r4:85952c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85952f8c r4:84aa1b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e0000 r8:84aa1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1b00 r8:80287e08 r7:ec96de60 r6:8479b300 r5:850e0000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec985fb0 to 0xec985ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:84223f00
INFO: task kworker/1:994:5992 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   de3c6000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:995:5994 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:995   state:D stack:0     pid:5994  tgid:5994  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:850e0c00
 r4:850e0c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e0c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc540
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:e0541000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595378c r4:85953400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595378c r4:84aa1b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e0c00 r8:84aa1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1b80 r8:80287e08 r7:ec985e60 r6:8479b380 r5:850e0c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec995fb0 to 0xec995ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc000
INFO: task kworker/1:995:5994 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   de76e000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:996:5995 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:996   state:D stack:0     pid:5995  tgid:5995  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:850e1800
 r4:850e1800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e1800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:df91f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595338c r4:85953000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595338c r4:84aa1c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e1800 r8:84aa1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1c00 r8:80287e08 r7:ec995e60 r6:8479b400 r5:850e1800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec999fb0 to 0xec999ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc000
INFO: task kworker/1:996:5995 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   deab4000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:431:5997 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:431   state:D stack:0     pid:5997  tgid:5997  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec961d84 r8:00000002 r7:60000113 r6:ec961d8c r5:850e2400
 r4:850e2400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e2400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2c40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb7b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b738c r4:858b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b738c r4:8479b480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e2400 r8:8479b4ac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479b480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479b480 r8:80287e08 r7:ebce5e60 r6:8479b500 r5:850e2400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec961fb0 to 0xec961ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2080
INFO: task kworker/0:431:5997 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   deefb000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:997:6000 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:997   state:D stack:0     pid:6000  tgid:6000  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9b5d84 r8:00000002 r7:60000113 r6:ec9b5d8c r5:850e4800
 r4:850e4800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e4800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc640
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eacc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85953b8c r4:85953800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85953b8c r4:84aa1c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e4800 r8:84aa1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1c80 r8:80287e08 r7:ec995e60 r6:8479b580 r5:850e4800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9b5fb0 to 0xec9b5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc340
INFO: task kworker/1:997:6000 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   df41f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:998:6002 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:998   state:D stack:0     pid:6002  tgid:6002  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9d9d84 r8:00000002 r7:60000113 r6:ec9d9d8c r5:850e5400
 r4:850e5400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e5400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc940
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb367000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595c38c r4:8595c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595c38c r4:84aa1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e5400 r8:84aa1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1d00 r8:80287e08 r7:ec9b5e60 r6:8479b600 r5:850e5400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9d9fb0 to 0xec9d9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc5c0
INFO: task kworker/1:998:6002 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   df857000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:999:6003 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:999   state:D stack:0     pid:6003  tgid:6003  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:850e3c00
 r4:850e3c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e3c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc7c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb0cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:85953f8c r4:85953c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:85953f8c r4:84aa1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e3c00 r8:84aa1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1d80 r8:80287e08 r7:ec9d9e60 r6:8479b680 r5:850e3c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9ddfb0 to 0xec9ddff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc5c0
INFO: task kworker/1:999:6003 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dfd6f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1000:6005 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1000  state:D stack:0     pid:6005  tgid:6005  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9e5d84 r8:00000002 r7:600f0113 r6:ec9e5d8c r5:850e3000
 r4:850e3000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e3000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcfc0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb987000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595cf8c r4:8595cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595cf8c r4:84aa1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e3000 r8:84aa1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1e00 r8:80287e08 r7:ec9d9e60 r6:8479b700 r5:850e3000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9e5fb0 to 0xec9e5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc4c0
INFO: task kworker/1:1000:6005 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   dff38000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1001:6007 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1001  state:D stack:0     pid:6007  tgid:6007  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000013 r6:ec9edd8c r5:850e6000
 r4:850e6000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e6000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bc780
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:850e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb517000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595c78c r4:8595c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595c78c r4:84aa1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e6000 r8:84aa1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1e80 r8:80287e08 r7:ec9e5e60 r6:8479b780 r5:850e6000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9edfb0 to 0xec9edff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc780
INFO: task kworker/1:1001:6007 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0265000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1002:6010 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1002  state:D stack:0     pid:6010  tgid:6010  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9a9d84 r8:00000002 r7:60000013 r6:ec9a9d8c r5:85846c00
 r4:85846c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85846c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bcec0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85846c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb947000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595cb8c r4:8595c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595cb8c r4:84aa1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85846c00 r8:84aa1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:84aa1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:84aa1f00 r8:80287e08 r7:ec9e5e60 r6:84aa1f80 r5:85846c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9a9fb0 to 0xec9a9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bca40
INFO: task kworker/1:1002:6010 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0387000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:432:6012 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:432   state:D stack:0     pid:6012  tgid:6012  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:850e6c00
 r4:850e6c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:850e6c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e8280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:850e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebcaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6af8c r4:84b6ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6af8c r4:8479b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:850e6c00 r8:8479b82c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479b800 r8:80287e08 r7:ebce5e60 r6:8479b880 r5:850e6c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9a5fb0 to 0xec9a5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2ac0
INFO: task kworker/0:432:6012 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0690000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:433:6013 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:433   state:D stack:0     pid:6013  tgid:6013  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:84b18000
 r4:84b18000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b18000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2f80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b18000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb8eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b7b8c r4:858b7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b7b8c r4:8479b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b18000 r8:8479b92c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479b900 r8:80287e08 r7:ec9a5e60 r6:8479b980 r5:84b18000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9e9fb0 to 0xec9e9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2ac0
INFO: task kworker/0:433:6013 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0b39000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:434:6016 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:434   state:D stack:0     pid:6016  tgid:6016  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9f5d84 r8:00000002 r7:60000113 r6:ec9f5d8c r5:84b18c00
 r4:84b18c00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b18c00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2440
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:858b7f8c r4:858b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:858b7f8c r4:8479ba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b18c00 r8:8479ba2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479ba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479ba00 r8:80287e08 r7:ec9a5e60 r6:8479ba80 r5:84b18c00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9f5fb0 to 0xec9f5ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2e00
INFO: task kworker/0:434:6016 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0d83000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1003:6019 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1003  state:D stack:0     pid:6019  tgid:6019  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000013 r6:ec9fdd8c r5:84b19800
 r4:84b19800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b19800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bca80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:eb9ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595d38c r4:8595d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595d38c r4:846ee000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b19800 r8:846ee02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:846ee000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846ee000 r8:80287e08 r7:ec9e5e60 r6:8479bb00 r5:84b19800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9fdfb0 to 0xec9fdff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bc9c0
INFO: task kworker/1:1003:6019 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e0f7f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1004:6021 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1004  state:D stack:0     pid:6021  tgid:6021  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca01d84 r8:00000002 r7:60000113 r6:eca01d8c r5:85846000
 r4:85846000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85846000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b837c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85846000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595df8c r4:8595dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595df8c r4:846ee080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85846000 r8:846ee0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:846ee080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846ee080 r8:80287e08 r7:ec9fde60 r6:846ee100 r5:85846000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca01fb0 to 0xeca01ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:847bcf80
INFO: task kworker/1:1004:6021 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e10a3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:435:6023 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:435   state:D stack:0     pid:6023  tgid:6023  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:85845400
 r4:85845400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:85845400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e2280
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebba3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595db8c r4:8595d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8595db8c r4:8479bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85845400 r8:8479bbac r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479bb80 r8:80287e08 r7:ec9a5e60 r6:846ee180 r5:85845400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca09fb0 to 0xeca09ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2840
INFO: task kworker/0:435:6023 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e1618000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1005:6024 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1005  state:D stack:0     pid:6024  tgid:6024  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:ec9f9d84 r8:00000002 r7:60000013 r6:ec9f9d8c r5:84b1a400
 r4:84b1a400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1a400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83100
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebb7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595d78c r4:8595d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595d78c r4:846ee200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b1a400 r8:846ee22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:846ee200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846ee200 r8:80287e08 r7:eca01e60 r6:8479bc00 r5:84b1a400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xec9f9fb0 to 0xec9f9ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b83180
INFO: task kworker/1:1005:6024 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e1912000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:1006:6026 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1006  state:D stack:0     pid:6026  tgid:6026  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:84b1b000
 r4:84b1b000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1b000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b83b40
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:84b1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebe17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8595eb8c r4:8595e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:8595eb8c r4:846ee280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b1b000 r8:846ee2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:846ee280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:846ee280 r8:80287e08 r7:eca01e60 r6:8479bc80 r5:84b1b000
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca05fb0 to 0xeca05ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:83b83280
INFO: task kworker/1:1006:6026 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e1912000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:436:6028 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:436   state:D stack:0     pid:6028  tgid:6028  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:84b1bc00
 r4:84b1bc00
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1bc00 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e80c0
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebbcf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6b38c r4:84b6b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6b38c r4:8479bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b1bc00 r8:8479bd2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479bd00 r8:80287e08 r7:ec9a5e60 r6:8479bd80 r5:84b1bc00
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca11fb0 to 0xeca11ff8)
1fa0:                                     00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:846e2180
INFO: task kworker/0:436:6028 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e1c42000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:437:6030 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:437   state:D stack:0     pid:6030  tgid:6030  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca0dd84 r8:00000002 r7:60000113 r6:eca0dd8c r5:84b1c800
 r4:84b1c800
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1c800 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca0de08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84537d80
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ec8f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:8597d38c r4:8597d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:8597d38c r4:8479be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b1c800 r8:8479be2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479be00 r8:80287e08 r7:ec9a5e60 r6:8479be80 r5:84b1c800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca0dfb0 to 0xeca0dff8)
dfa0:                                     00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845e8100
INFO: task kworker/0:437:6030 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e219f000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:438:6032 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:438   state:D stack:0     pid:6032  tgid:6032  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca15d84 r8:00000002 r7:60000113 r6:eca15d8c r5:84b1d400
 r4:84b1d400
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1d400 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca15e08
 r4:00000000
[<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845e8480
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018005 r8:84b1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:ebd09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:84b6ab8c r4:84b6a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:dddced80 r6:83018000 r5:84b6ab8c r4:8479bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:84b1d400 r8:8479bf2c r7:82804d40 r6:dddced80 r5:dddceda0
 r4:8479bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8479bf00 r8:80287e08 r7:eca0de60 r6:8479bf80 r5:84b1d400
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeca15fb0 to 0xeca15ff8)
5fa0:                                     00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:845e8100
INFO: task kworker/0:438:6032 is blocked on a mutex likely owned by task kworker/1:426:4465.
task:kworker/1:426   state:R  running task     stack:0     pid:4465  tgid:4465  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
 r10:82ac21c4 r9:85384800 r8:80200be4 r7:eaf29d5c r6:ffffffff r5:85384800
 r4:00000000
[<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xeaf29d28 to 0xeaf29d70)
9d20:                   e24e3000 ed8b5000 00000001 80239b98 7f3cf000 00000001
9d40: 82ac15a0 7f3cf000 ed8b5000 8280c928 82ac21c4 eaf29da4 eaf29da8 eaf29d78
9d60: 80230ad0 80239bb0 80070113 ffffffff
 r5:80070113 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
 r4:82ac21e4
[<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaf29dc0 r5:eaf29e08
 r4:eaf29dc0
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cf000
 r4:00000000
[<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431)
 r9:83018205 r8:85384800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
 r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
 r5:852bd78c r4:852bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
 r7:ddde2d80 r6:83018200 r5:852bd78c r4:8530ac00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
 r10:61c88647 r9:85384800 r8:8530ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
 r4:8530ac00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
 r10:00000000 r9:8530ac00 r8:80287e08 r7:eaf25e60 r6:8521a100 r5:85384800
 r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf29fb0 to 0xeaf29ff8)
9fa0:                                     00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
 r4:852cfa40
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:439:6034 blocked for more than 478 seconds.
      Not tainted 6.15.0-rc7-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:439   state:D stack:0     pid:6034  tgid:6034  ppid:2      task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace: 
[<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
 r10:8291a684 r9:eca19d84 r8:00000002 r7:60000113 r6:eca19d8c r5:84b1e000
 r4:84b1e000
[<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
 r5:84b1e000 r4:8291a680
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)

Crashes (580):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/25 05:51 upstream b1427432d3b6 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/25 02:20 upstream b1427432d3b6 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/24 16:14 upstream 4856ebd99715 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/24 12:56 upstream 4856ebd99715 ed351ea7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/22 18:46 upstream d608703fcdd9 0919b50b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/21 20:43 upstream 4a95bc121ccd 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/21 08:18 upstream b36ddb9210e6 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 17:08 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 12:42 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 07:31 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/20 02:40 upstream a5806cd506af 8f9cf946 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/25 00:39 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/24 08:49 upstream 28eb75e178d3 4dfba277 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/12 11:02 upstream 2d5404caa8c7 75bb1b32 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/04 08:32 upstream a33ab3f94f51 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 18:58 upstream 3e5e6c9900c3 f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 04:29 upstream 11066801dd4b f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 15:05 upstream c426456857fa f00eed24 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/26 21:47 upstream 850925a8133c 65e8686b .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/08 16:32 upstream 87d6aab2389e 402f1df0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 17:02 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 12:53 upstream 8cf0b93919e1 d7906eff .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/29 13:37 upstream 3efc57369a0c ba29ff75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/20 23:19 upstream baeb9a7d8b60 6f888b75 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/04 13:06 upstream 88fac17500f4 9d47f20a .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 11:06 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 09:52 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/26 06:56 upstream 5be63fc19fca d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/08/25 16:35 upstream 780bdc1ba776 d7d32352 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/30 14:11 upstream 4a4be1ad3a6e 34889ee3 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/05/02 10:41 upstream 0106679839f7 3ba885bc .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/04/02 19:56 upstream 026e680b0a08 f861ecca .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 15:06 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/27 06:52 upstream 7033999ecd7b 454571b6 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/25 04:41 upstream 5e74df2f8f15 0ea90952 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/03/05 10:51 upstream 90d35da658da 5fc53669 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/02/06 07:42 upstream 54be6c6c5ae8 6404acf9 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/29 16:08 upstream 41bccc98fb79 991a98f4 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 16:09 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/28 11:47 upstream 8a696a29c690 cc4a4020 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/01/03 12:03 upstream 610a9b8f49fb fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/09/14 16:36 upstream f83a4f2a4d8c e2beed91 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/09/07 23:38 upstream 6ab41fca2e80 d291dd2d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/09/06 13:21 upstream d1d10cea0895 d291dd2d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/08/23 14:21 upstream 6debb6904172 bf27483f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/08/12 12:17 upstream 53e760d89498 c06e8995 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/28 21:26 upstream 038d61fd6422 6654ea9c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/23 07:26 upstream 89be9a83ccf1 e1dd4f22 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/22 19:34 upstream 89be9a83ccf1 8e9d1dc1 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/15 13:26 upstream 155a3c003e55 03fcfc4b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/11 16:21 upstream bc9ff192a6c9 3cda49cf .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/07/05 13:13 upstream a79a588fc176 4f67c4ae .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/30 22:39 upstream d0b3b7b22dfa 6e83b42d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/26 07:05 upstream 92ca6c498a5e 26d77996 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/22 17:54 upstream 739a6c93cc75 d6cdfb8a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/21 23:48 upstream 3f75bfff44be d6cdfb8a .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/20 03:27 upstream fb4d33ab452e ed3e87f7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/19 13:53 upstream 74b4cc9b8780 ed3e87f7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/17 00:35 upstream e04c78d86a96 d1716036 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/15 16:03 upstream 8c6bc74c7f89 5f4b362d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/14 00:30 upstream 27605c8c0f69 1f72c409 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/13 07:09 upstream 27605c8c0f69 98683f8f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/10 21:55 upstream f09079bd04a9 5d7e17ca .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/10 03:10 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 23:07 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 19:55 upstream 19272b37aa4f 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/09 04:52 upstream 939f15e640f1 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/08 11:34 upstream 8630c59e9936 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/07 20:09 upstream bdc7f8c5adad 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/07 09:09 upstream c0c9379f235d 4826c28e .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/06 17:35 upstream e271ed52b344 3d899f2c .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/05 20:38 upstream ec7714e49479 6b6b5f21 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/03 09:36 upstream d00a83477e7a a30356b7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/03 06:30 upstream d00a83477e7a a30356b7 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/02 18:26 upstream cd2e103d57e5 aaaaf5ea .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/01 20:45 upstream 7d4e49a77d99 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/06/01 09:28 upstream 4cb6c8af8591 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/31 07:05 upstream 8477ab143069 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/30 16:12 upstream f66bc387efbe 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/30 04:34 upstream 9d230d500b0e 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/29 16:41 upstream 90b83efa6701 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/29 04:31 upstream feacb1774bd5 3d2f584d .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/28 01:57 upstream 914873bc7df9 874a1386 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/26 19:43 upstream 0ff41df1cb26 06877188 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/26 10:32 upstream 0f8c0258bf04 2d4582d0 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2025/05/08 00:10 upstream 707df3375124 dbf35fa1 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/21 10:41 upstream 43fb83c17ba2 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 22:30 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/20 19:17 upstream bf9aa14fc523 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 16:05 upstream 158f238aa69d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/19 03:30 upstream 23acd177540d 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/18 07:48 upstream adc218676eef 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 18:27 upstream 4a5df3796467 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/17 04:07 upstream b5a24181e461 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/13 20:06 upstream f1b785f4c787 4dfba277 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/11 02:51 upstream a9cda7c0ffed 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 12:13 upstream de2f378f2b77 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/10 01:27 upstream da4373fbcf00 6b856513 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/08 10:22 upstream 906bd684e4b1 179b040e .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/03 13:52 upstream 3e5e6c9900c3 f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/11/02 12:22 upstream c426456857fa f00eed24 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/29 06:31 upstream e42b1a9a2557 66aeb999 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/20 11:21 upstream 715ca9dd687f cd6fc0a3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/16 04:53 upstream 2f87d0916ce0 bde2d81c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/12 19:20 upstream 09f6b0c8904b 084d8178 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/11 17:36 upstream 1d227fcc7222 5e7b4bca .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 22:47 upstream 1d227fcc7222 cd942402 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 18:09 upstream d3d1556696c1 d44647df .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/10 07:06 upstream b983b271662b 0278d004 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/09 17:31 upstream 75b607fab38d 56fb2cb7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/07 08:05 upstream 8cf0b93919e1 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/05 16:35 upstream 27cc6fdf7201 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/04 07:51 upstream 0c559323bbaa d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/10/03 18:26 upstream 7ec462100ef9 d7906eff .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/24 07:04 upstream 18ba6034468e 89298aad .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/18 12:26 upstream 2f27fce67173 c673ca06 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 11:09 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/06 10:02 upstream ad618736883b 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 21:28 upstream c763c4339688 464ac2ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2024/09/05 06:34 upstream c7fb1692dc01 dfbe2ed4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
2023/12/25 04:12 upstream 861deac3b092 fb427a07 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 INFO: task hung in _vm_unmap_aliases
* Struck through repros no longer work on HEAD.