[ 9781.929813] run fstests generic/131 at 2022-08-17 23:35:26
[ 9782.416509] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9782.416517] BTRFS info (device dm-0): using free space tree
[ 9783.575230] =============================
[ 9783.575232] WARNING: suspicious RCU usage
[ 9783.575233] 6.0.0-rc1+ #800 Tainted: G W
[ 9783.575235] -----------------------------
[ 9783.575236] include/net/sock.h:592 suspicious rcu_dereference_check() usage!
[ 9783.575238]
other info that might help us debug this:
[ 9783.575239]
rcu_scheduler_active = 2, debug_locks = 1
[ 9783.575242] 5 locks held by locktest/1343690:
[ 9783.575244] #0: ffff90c5d679ccd0 (&sb->s_type->i_mutex_key#9){+.+.}-{3:3}, at: __sock_release+0x2d/0xb0
[ 9783.575256] #1: ffff90c5c4a0a3b0 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_close+0x15/0x70
[ 9783.575263] #2: ffff90c5c13029b8 (&h->lhash2[i].lock){+.+.}-{2:2}, at: inet_unhash+0x9e/0x110
[ 9783.575271] #3: ffffffffa0f49ad8 (reuseport_lock){+...}-{2:2}, at: reuseport_detach_sock+0x16/0x160
[ 9783.575284] #4: ffff90c5c4a0a638 (clock-AF_INET){++..}-{2:2}, at: bpf_sk_reuseport_detach+0x1b/0xa0
[ 9783.575296]
stack backtrace:
[ 9783.575299] CPU: 1 PID: 1343690 Comm: locktest Tainted: G W 6.0.0-rc1+ #800
[ 9783.575302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
[ 9783.575305] Call Trace:
[ 9783.575307]
[ 9783.575309] dump_stack_lvl+0x56/0x73
[ 9783.575313] bpf_sk_reuseport_detach+0x93/0xa0
[ 9783.575316] reuseport_detach_sock+0x43/0x160
[ 9783.575320] inet_unhash+0xbb/0x110
[ 9783.575323] tcp_set_state+0x56/0x1e0
[ 9783.575331] __tcp_close+0x3d5/0x490
[ 9783.575335] tcp_close+0x20/0x70
[ 9783.575338] inet_release+0x3c/0x80
[ 9783.575341] __sock_release+0x3a/0xb0
[ 9783.575344] sock_close+0x14/0x20
[ 9783.575346] __fput+0xa2/0x260
[ 9783.575352] task_work_run+0x59/0xa0
[ 9783.575356] exit_to_user_mode_prepare+0x232/0x260
[ 9783.575360] syscall_exit_to_user_mode+0x16/0x50
[ 9783.575363] do_syscall_64+0x48/0x90
[ 9783.575366] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 9783.575369] RIP: 0033:0x7f383b4038f7
[ 9783.575373] Code: 00 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 33 fc ff ff
[ 9783.575375] RSP: 002b:00007ffc44cef058 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[ 9783.575378] RAX: 0000000000000000 RBX: 00007f383b3d3598 RCX: 00007f383b4038f7
[ 9783.575380] RDX: 0000000000401a70 RSI: 0000000000000000 RDI: 0000000000000004
[ 9783.575381] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[ 9783.575382] R10: 00007f383b2183e0 R11: 0000000000000246 R12: 0000000000000000
[ 9783.575383] R13: 0000000000000002 R14: 00007f383b3d5948 R15: 00007f383b3d5960
[ 9783.575394]
[ 9784.091891] BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm
[ 9784.091899] BTRFS info (device dm-0): using free space tree