INFO: task syz.3.1993:13997 blocked for more than 143 seconds.
      Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz.3.1993      state:D stack:24960 pid:13997 tgid:13995 ppid:10889  task_flags:0x400040 flags:0x00080002
Call Trace:
 <TASK>
 __schedule+0x15dd/0x52d0
 schedule+0x164/0x360
 schedule_preempt_disabled+0x13/0x30
 rwsem_down_read_slowpath+0x61e/0x920
 down_read+0x99/0x2e0
 super_lock+0x2d6/0x3d0
 user_get_super+0xc8/0x120
 __se_sys_quotactl+0x540/0x9e0
 do_syscall_64+0x14d/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc51019c799
RSP: 002b:00007fc5110f3028 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3
RAX: ffffffffffffffda RBX: 00007fc510415fa0 RCX: 00007fc51019c799
RDX: 0000000000000000 RSI: 0000200000000000 RDI: ffffffff80000802
RBP: 00007fc510232c99 R08: 0000000000000000 R09: 0000000000000000
R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fc510416038 R14: 00007fc510415fa0 R15: 00007ffd32721f18
 </TASK>

Showing all locks held in the system:
5 locks held by kworker/u8:1/13:
3 locks held by kworker/1:1/32:
1 lock held by khungtaskd/34:
 #0: ffffffff8e75e520 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180
3 locks held by kworker/1:2/795:
2 locks held by getty/5637:
 #0: ffff888172a370a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70
 #1: ffffc9000356e2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x45c/0x13c0
2 locks held by kworker/1:5/5861:
 #0: ffff88810006b148 ((wq_completion)events){+.+.}-{0:0}, at: process_scheduled_works+0xa52/0x18c0
 #1: ffffc9000664fc40 (free_ipc_work){+.+.}-{0:0}, at: process_scheduled_works+0xa8d/0x18c0
2 locks held by syz-executor/5949:
1 lock held by syz.3.1993/13997:
 #0: ffff888109c560e0 (&type->s_umount_key#65){++++}-{4:4}, at: super_lock+0x2d6/0x3d0
1 lock held by syz.3.2674/17094:
 #0: ffff888109c560e0 (&type->s_umount_key#65){++++}-{4:4}, at: super_lock+0x289/0x3d0
1 lock held by syz.2.2776/17730:
 #0: ffff888109c560e0 (&type->s_umount_key#65){++++}-{4:4}, at: super_lock+0x2d6/0x3d0
7 locks held by syz-executor/18190:
 #0: ffff888171748420 (sb_writers#7){.+.+}-{0:0}, at: vfs_write+0x227/0xb90
 #1: ffff8881bada9488 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x1de/0x540
 #2: ffff88810923c878 (kn->active#48){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x231/0x540
 #3: ffffffff8f442628 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd7/0x370
 #4: ffff888120b4b0e8 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xb6/0x860
 #5: ffff888117716250 (&devlink->lock_key#23){+.+.}-{4:4}, at: nsim_drv_remove+0x50/0x170
 #6: ffffffff8e764680 (rcu_state.barrier_mutex){+.+.}-{4:4}, at: rcu_barrier+0x4c/0x580
5 locks held by dhcpcd-run-hook/18314:

=============================================

NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 34 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150
 nmi_cpu_backtrace+0x274/0x2d0
 nmi_trigger_cpumask_backtrace+0x17a/0x300
 sys_info+0x135/0x170
 watchdog+0xfd9/0x1030
 kthread+0x388/0x470
 ret_from_fork+0x51e/0xb90
 ret_from_fork_asm+0x1a/0x30
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 18159 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:kasan_byte_accessible+0x16/0x30
Code: 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 48 c1 ef 03 48 b8 00 00 00 00 00 fc ff df 0f b6 04 07 <3c> 08 0f 92 c0 c3 cc cc cc cc cc 66 66 66 66 66 66 2e 0f 1f 84 00
RSP: 0018:ffffc90006c1f7b8 EFLAGS: 00000802
RAX: 0000000000000000 RBX: ffffffff8bb10e80 RCX: 0000000080000002
RDX: 0000000000000000 RSI: ffffffff8bb10e80 RDI: 1ffffffff34a3026
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: dffffc0000000000 R11: fffffbfff2023477 R12: 0000000000000000
R13: ffffffff9a518130 R14: ffffffff9a518130 R15: 0000000000000001
FS:  000055555ca48500(0000) GS:ffff88818de5d000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3ac9eab270 CR3: 0000000114102000 CR4: 00000000000006f0
Call Trace:
 <TASK>
 __kasan_check_byte+0x12/0x40
 lock_acquire+0x79/0x2e0
 _raw_spin_lock_irqsave+0x40/0x60
 debug_check_no_obj_freed+0x145/0x550
 remove_vm_area+0x1d3/0x300
 vfree+0x63/0x400
 kcov_close+0x28/0x50
 __fput+0x44f/0xa70
 task_work_run+0x1d9/0x270
 do_exit+0x70f/0x23c0
 do_group_exit+0x21b/0x2d0
 get_signal+0x1284/0x1330
 arch_do_signal_or_restart+0xbc/0x830
 exit_to_user_mode_loop+0x86/0x480
 do_syscall_64+0x32d/0xf80
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4982f5cfce
Code: Unable to access opcode bytes at 0x7f4982f5cfa4.
RSP: 002b:00007ffed5c7f7e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: 0000000000000028 RBX: 000055555ca48500 RCX: 00007f4982f5cfce
RDX: 0000000000000028 RSI: 00007f4983d44670 RDI: 0000000000000003
RBP: 0000000000000001 R08: 00007ffed5c7f864 R09: 000000000000000c
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
R13: 0000000000000000 R14: 00007f4983d44670 R15: 0000000000000000
 </TASK>
