[ 9755.266867] run fstests generic/131 at 2022-08-19 23:33:46
[ 9755.758426] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9755.758436] BTRFS info (device dm-0): using free space tree
[ 9756.973077] =============================
[ 9756.973079] WARNING: suspicious RCU usage
[ 9756.973081] 6.0.0-rc1+ #802 Not tainted
[ 9756.973084] -----------------------------
[ 9756.973085] include/net/sock.h:592 suspicious rcu_dereference_check() usage!
[ 9756.973088]
other info that might help us debug this:
[ 9756.973090]
rcu_scheduler_active = 2, debug_locks = 1
[ 9756.973096] 5 locks held by locktest/1319277:
[ 9756.973103] #0: ffff8e73553c5850 (&sb->s_type->i_mutex_key#9){+.+.}-{3:3}, at: __sock_release+0x2d/0xb0
[ 9756.973120] #1: ffff8e7343358cb0 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x15/0x70
[ 9756.973133] #2: ffff8e734131a718 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x9e/0x110
[ 9756.973147] #3: ffffffffabf49ad8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x16/0x160
[ 9756.973161] #4: ffff8e7343358f38 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x1b/0xa0
[ 9756.973174]
stack backtrace:
[ 9756.973179] CPU: 0 PID: 1319277 Comm: locktest Not tainted 6.0.0-rc1+ #802
[ 9756.973182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
[ 9756.973188] Call Trace:
[ 9756.973190]
[ 9756.973194] dump_stack_lvl+0x56/0x73
[ 9756.973200] bpf_sk_reuseport_detach+0x93/0xa0
[ 9756.973206] reuseport_detach_sock+0x43/0x160
[ 9756.973211] inet_unhash+0xbb/0x110
[ 9756.973216] tcp_set_state+0x56/0x1e0
[ 9756.973232] __tcp_close+0x3d5/0x490
[ 9756.973239] tcp_close+0x20/0x70
[ 9756.973243] inet_release+0x3c/0x80
[ 9756.973248] __sock_release+0x3a/0xb0
[ 9756.973254] sock_close+0x14/0x20
[ 9756.973258] __fput+0xa2/0x260
[ 9756.973266] task_work_run+0x59/0xa0
[ 9756.973272] exit_to_user_mode_prepare+0x232/0x260
[ 9756.973278] syscall_exit_to_user_mode+0x16/0x50
[ 9756.973282] do_syscall_64+0x48/0x90
[ 9756.973287] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 9756.973292] RIP: 0033:0x7f582eb5d9b7
[ 9756.973299] Code: 00 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 33 fc ff ff
[ 9756.973302] RSP: 002b:00007ffd50bdbd68 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[ 9756.973307] RAX: 0000000000000000 RBX: 00007f582eb2f598 RCX: 00007f582eb5d9b7
[ 9756.973309] RDX: 0000000000401a70 RSI: 0000000000000000 RDI: 0000000000000004
[ 9756.973311] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[ 9756.973313] R10: 00007f582e9743e0 R11: 0000000000000246 R12: 0000000000000000
[ 9756.973315] R13: 0000000000000002 R14: 00007f582eb31948 R15: 00007f582eb31960
[ 9756.973337]
[ 9757.564085] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9757.564103] BTRFS info (device dm-0): using free space tree