======================================
| [ 1302.270584][T14566] rcu_scheduler_active = 2, debug_locks = 1
| [ 1302.270825][T14566] no locks held by smcrouted/14566.
| [ 1302.271012][T14566]
| [ 1302.271012][T14566] stack backtrace:
[ 1302.271504][T14566] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 1302.271700][T14566] Call Trace:
[ 1302.271823][T14566]  <TASK>
[1302.271910][T14566] dump_stack_lvl (lib/dump_stack.c:123) 
[1302.272106][T14566] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) 
[1302.272272][T14566] ip6mr_get_table (net/ipv6/ip6mr.c:132 (discriminator 11)) 
[1302.272466][T14566] ip6_mroute_setsockopt (net/ipv6/ip6mr.c:1670) 
[1302.272643][T14566] ? __pfx_ip6_mroute_setsockopt (net/ipv6/ip6mr.c:1658) 
[1302.272850][T14566] ? __lock_release (kernel/locking/lockdep.c:5501) 
[1302.273026][T14566] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) 
[1302.273188][T14566] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) 
[1302.273359][T14566] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) 
[1302.273543][T14566] ? lock_acquire (kernel/locking/lockdep.c:5798) 
[1302.273790][T14566] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) 
[1302.273962][T14566] ? __might_fault (mm/memory.c:6716 mm/memory.c:6709) 
[1302.274128][T14566] do_ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:415) 
[1302.274299][T14566] ? __lock_release (kernel/locking/lockdep.c:5486) 
[1302.274461][T14566] ? __pfx_do_ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:395) 
[1302.274624][T14566] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5790) 
[1302.274794][T14566] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) 
[1302.274971][T14566] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) 
[1302.275141][T14566] ? is_bpf_text_address (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 kernel/bpf/core.c:769) 
[1302.275312][T14566] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) 
[1302.275473][T14566] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) 
[1302.275632][T14566] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) 
[1302.275757][T14566] ? __lock_acquire (kernel/locking/lockdep.c:5202) 
[1302.275915][T14566] ? queued_spin_lock_slowpath (./arch/x86/include/asm/atomic.h:107 ./include/linux/atomic/atomic-arch-fallback.h:2130 ./include/linux/atomic/atomic-instrumented.h:1280 ./arch/x86/include/asm/qspinlock.h:104 kernel/locking/qspinlock.c:324) 
[1302.276092][T14566] ? __pfx_queued_spin_lock_slowpath (kernel/locking/qspinlock.c:314) 
[1302.276288][T14566] ? find_held_lock (kernel/locking/lockdep.c:5315) 
[1302.276455][T14566] ? ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:996) 
[1302.276617][T14566] ipv6_setsockopt (net/ipv6/ipv6_sockglue.c:996) 
[1302.276781][T14566] rawv6_setsockopt (net/ipv6/raw.c:1054) 
[1302.276954][T14566] ? __pfx_rawv6_setsockopt (net/ipv6/raw.c:1039) 
[1302.277115][T14566] ? __lock_acquire (kernel/locking/lockdep.c:5202) 
[1302.277281][T14566] ? kfree (mm/slub.c:4716) 
[1302.277422][T14566] do_sock_setsockopt (net/socket.c:2336) 
[1302.277583][T14566] ? __pfx_do_sock_setsockopt (net/socket.c:2305) 
[1302.277758][T14566] ? __lock_release (kernel/locking/lockdep.c:5501) 
[1302.277939][T14566] ? fd_install (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:962 fs/file.c:612) 
[1302.278128][T14566] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) 
[1302.278293][T14566] ? fdget (./include/linux/atomic/atomic-arch-fallback.h:479 ./include/linux/atomic/atomic-instrumented.h:50 fs/file.c:1114 fs/file.c:1128) 
[1302.278418][T14566] __sys_setsockopt (./include/linux/file.h:35 net/socket.c:2361) 
[1302.278582][T14566] ? __pfx___sys_setsockopt (net/socket.c:2349) 
[1302.278742][T14566] ? __sys_socket (net/socket.c:496 net/socket.c:1727) 
[1302.278916][T14566] ? __pfx___sys_socket (net/socket.c:1714) 
[1302.279089][T14566] ? do_user_addr_fault (./include/linux/mmap_lock.h:172 arch/x86/mm/fault.c:1417) 
[1302.279254][T14566] __x64_sys_setsockopt (net/socket.c:2365) 
[1302.279413][T14566] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) 
[1302.279614][T14566] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
[1302.279774][T14566] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
[ 1302.279985][T14566] RIP: 0033:0x7f9d673cd91e
[ 1302.280158][T14566] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9
All code
========
   0:	0f 1f 40 00          	nopl   0x0(%rax)
   4:	48 8b 15 e1 94 0a 00 	mov    0xa94e1(%rip),%rdx        # 0xa94ec
   b:	f7 d8                	neg    %eax
   d:	64 89 02             	mov    %eax,%fs:(%rdx)
  10:	48 c7 c0 ff ff ff ff 	mov    $0xffffffffffffffff,%rax
  17:	eb b1                	jmp    0xffffffffffffffca
  19:	0f 1f 00             	nopl   (%rax)
  1c:	f3 0f 1e fa          	endbr64
  20:	49 89 ca             	mov    %rcx,%r10
  23:	b8 36 00 00 00       	mov    $0x36,%eax
  28:	0f 05                	syscall
  2a:*	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax		<-- trapping instruction
  30:	77 0a                	ja     0x3c
  32:	c3                   	ret
  33:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  3a:	00 00 
  3c:	48                   	rex.W
  3d:	8b                   	.byte 0x8b
  3e:	15                   	.byte 0x15
  3f:	a9                   	.byte 0xa9

Code starting with the faulting instruction
===========================================
   0:	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax
   6:	77 0a                	ja     0x12
   8:	c3                   	ret
   9:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  10:	00 00 
  12:	48                   	rex.W
  13:	8b                   	.byte 0x8b
  14:	15                   	.byte 0x15
  15:	a9                   	.byte 0xa9
[ 1302.280743][T14566] RSP: 002b:00007ffeae861c28 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 1302.280998][T14566] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9d673cd91e
[ 1302.281242][T14566] RDX: 00000000000000c8 RSI: 0000000000000029 RDI: 0000000000000008
[ 1302.281487][T14566] RBP: 0000000000000008 R08: 0000000000000004 R09: 0000000000000000
[ 1302.281725][T14566] R10: 00007ffeae861c4c R11: 0000000000000246 R12: 0000000000000000


Finger prints:
lockdep_rcu_suspicious:ip6mr_get_table:ip6_mroute_setsockopt:do_ipv6_setsockopt:ipv6_setsockopt