====================================== | [ 1289.466933][T16457] rcu_scheduler_active = 2, debug_locks = 1 | [ 1289.467305][T16457] no locks held by smcrouted/16457. | [ 1289.467606][T16457] | [ 1289.467606][T16457] stack backtrace: [ 1289.468114][T16457] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1289.468351][T16457] Call Trace: [ 1289.468476][T16457] [1289.468562][T16457] dump_stack_lvl (lib/dump_stack.c:123) [1289.468729][T16457] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [1289.468894][T16457] ip6mr_get_table (net/ipv6/ip6mr.c:132 (discriminator 11)) [1289.469115][T16457] ip6_mroute_setsockopt (net/ipv6/ip6mr.c:1670) [1289.469335][T16457] ? __pfx_ip6_mroute_setsockopt (net/ipv6/ip6mr.c:1658) [1289.469567][T16457] ? __lock_release (kernel/locking/lockdep.c:5501) [1289.469747][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.469975][T16457] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [1289.470157][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.470402][T16457] ? lock_acquire (kernel/locking/lockdep.c:5798) [1289.470559][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.470720][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.470891][T16457] do_ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:415) [1289.471052][T16457] ? __lock_release (kernel/locking/lockdep.c:5486) [1289.471212][T16457] ? __pfx_do_ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:395) [1289.471380][T16457] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5790) [1289.471541][T16457] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [1289.471696][T16457] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [1289.471858][T16457] ? is_bpf_text_address (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 kernel/bpf/core.c:769) [1289.472029][T16457] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [1289.472205][T16457] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [1289.472375][T16457] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [1289.472504][T16457] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [1289.472730][T16457] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [1289.472886][T16457] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [1289.473046][T16457] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [1289.473204][T16457] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [1289.473398][T16457] ? ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:996) [1289.473562][T16457] ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:996) [1289.473722][T16457] rawv6_setsockopt (net/ipv6/raw.c:1054) [1289.473948][T16457] ? __pfx_rawv6_setsockopt (net/ipv6/raw.c:1039) [1289.474146][T16457] ? kfree (mm/slub.c:4716) [1289.474339][T16457] do_sock_setsockopt (net/socket.c:2336) [1289.474536][T16457] ? __pfx_do_sock_setsockopt (net/socket.c:2305) [1289.474693][T16457] ? __pfx___lock_release (kernel/locking/lockdep.c:5477) [1289.474851][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.475020][T16457] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) [1289.475246][T16457] ? lock_acquire (kernel/locking/lockdep.c:5798) [1289.475410][T16457] ? fdget (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1114 fs/file.c:1128) [1289.475534][T16457] __sys_setsockopt (./include/linux/file.h:35 net/socket.c:2361) [1289.475697][T16457] ? __pfx___sys_setsockopt (net/socket.c:2349) [1289.475917][T16457] ? __pfx___sys_socket (net/socket.c:1714) [1289.476171][T16457] __x64_sys_setsockopt (net/socket.c:2365) [1289.476356][T16457] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [1289.476635][T16457] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [1289.476813][T16457] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1289.477022][T16457] RIP: 0033:0x7fe5fc54191e [ 1289.477293][T16457] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9 All code ======== 0: 0f 1f 40 00 nopl 0x0(%rax) 4: 48 8b 15 e1 94 0a 00 mov 0xa94e1(%rip),%rdx # 0xa94ec b: f7 d8 neg %eax d: 64 89 02 mov %eax,%fs:(%rdx) 10: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax 17: eb b1 jmp 0xffffffffffffffca 19: 0f 1f 00 nopl (%rax) 1c: f3 0f 1e fa endbr64 20: 49 89 ca mov %rcx,%r10 23: b8 36 00 00 00 mov $0x36,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 0a ja 0x3c 32: c3 ret 33: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 3a: 00 00 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 15 .byte 0x15 3f: a9 .byte 0xa9 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 0a ja 0x12 8: c3 ret 9: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 10: 00 00 12: 48 rex.W 13: 8b .byte 0x8b 14: 15 .byte 0x15 15: a9 .byte 0xa9 [ 1289.477952][T16457] RSP: 002b:00007ffc19a4c268 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1289.478235][T16457] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5fc54191e [ 1289.478533][T16457] RDX: 00000000000000c8 RSI: 0000000000000029 RDI: 0000000000000008 [ 1289.478792][T16457] RBP: 0000000000000008 R08: 0000000000000004 R09: 0000000000000000 [ 1289.479107][T16457] R10: 00007ffc19a4c28c R11: 0000000000000246 R12: 0000000000000000 Finger prints: lockdep_rcu_suspicious:ip6mr_get_table:ip6_mroute_setsockopt:do_ipv6_setsockopt:ipv6_setsockopt