[ 9784.542393] run fstests generic/131 at 2022-08-20 23:34:14
[ 9785.003850] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9785.003856] BTRFS info (device dm-0): using free space tree
[ 9786.189086] =============================
[ 9786.189089] WARNING: suspicious RCU usage
[ 9786.189091] 6.0.0-rc1+ #803 Not tainted
[ 9786.189093] -----------------------------
[ 9786.189095] include/net/sock.h:592 suspicious rcu_dereference_check() usage!
[ 9786.189098]
other info that might help us debug this:
[ 9786.189100]
rcu_scheduler_active = 2, debug_locks = 1
[ 9786.189104] 5 locks held by locktest/1316959:
[ 9786.189107] #0: ffff983055087510 (&sb->s_type->i_mutex_key#9){+.+.}-{3:3}, at: __sock_release+0x2d/0xb0
[ 9786.189124] #1: ffff983045858cb0 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x15/0x70
[ 9786.189140] #2: ffff983041245e98 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x9e/0x110
[ 9786.189154] #3: ffffffffa3f49ad8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x16/0x160
[ 9786.189167] #4: ffff983045858f38 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x1b/0xa0
[ 9786.189180]
stack backtrace:
[ 9786.189185] CPU: 1 PID: 1316959 Comm: locktest Not tainted 6.0.0-rc1+ #803
[ 9786.189188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
[ 9786.189194] Call Trace:
[ 9786.189197]
[ 9786.189200] dump_stack_lvl+0x56/0x73
[ 9786.189208] bpf_sk_reuseport_detach+0x93/0xa0
[ 9786.189214] reuseport_detach_sock+0x43/0x160
[ 9786.189225] inet_unhash+0xbb/0x110
[ 9786.189230] tcp_set_state+0x56/0x1e0
[ 9786.189246] __tcp_close+0x3d5/0x490
[ 9786.189254] tcp_close+0x20/0x70
[ 9786.189258] inet_release+0x3c/0x80
[ 9786.189264] __sock_release+0x3a/0xb0
[ 9786.189270] sock_close+0x14/0x20
[ 9786.189273] __fput+0xa2/0x260
[ 9786.189283] task_work_run+0x59/0xa0
[ 9786.189289] exit_to_user_mode_prepare+0x232/0x260
[ 9786.189295] syscall_exit_to_user_mode+0x16/0x50
[ 9786.189300] do_syscall_64+0x48/0x90
[ 9786.189305] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 9786.189309] RIP: 0033:0x7f9df36d59b7
[ 9786.189316] Code: 00 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 33 fc ff ff
[ 9786.189319] RSP: 002b:00007ffc2da004c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[ 9786.189324] RAX: 0000000000000000 RBX: 00007f9df36a7598 RCX: 00007f9df36d59b7
[ 9786.189326] RDX: 0000000000401a70 RSI: 0000000000000000 RDI: 0000000000000004
[ 9786.189328] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[ 9786.189331] R10: 00007f9df34ec3e0 R11: 0000000000000246 R12: 0000000000000000
[ 9786.189333] R13: 0000000000000002 R14: 00007f9df36a9948 R15: 00007f9df36a9960
[ 9786.189355]
[ 9787.246643] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9787.246652] BTRFS info (device dm-0): using free space tree