2014-06-09 15:17:06

by Sasha Levin

[permalink] [raw]
Subject: btrfs: hang on boot due to tests

Hi all,

It seems that some recent changes to btrfs tests make it hang during boot:

[ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
[ 49.730033] Modules linked in:
[ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
[ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
[ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
[ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
[ 49.730033] task: ffff880628550000 ti: ffff880036218000 task.ti: ffff880036218000
[ 49.730033] RIP: __write_lock_failed (arch/x86/lib/rwlock.S:20)
[ 49.730033] RSP: 0000:ffff88003621b9e8 EFLAGS: 00000297
[ 49.730033] RAX: 0000000000000022 RBX: ffffffff845658fb RCX: 000000059e1d8462
[ 49.730033] RDX: 0000000000000003 RSI: ffffffff85907bf4 RDI: ffff8800365c00bc
[ 49.730033] RBP: ffff88003621b9e8 R08: 0000000000001b48 R09: ffffffff819618b8
[ 49.730033] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88003621b958
[ 49.730033] R13: 0000000000000001 R14: ffff880036218000 R15: ffff880628550000
[ 49.730033] FS: 0000000000000000(0000) GS:ffff8800a6e00000(0000) knlGS:0000000000000000
[ 49.730033] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 49.730033] CR2: 00000000ffffffff CR3: 000000000602e000 CR4: 00000000000006a0
[ 49.730033] Stack:
[ 49.730033] ffff88003621ba08 ffffffff811d18de ffff88003621ba68 ffff8800365c00b8
[ 49.730033] ffff88003621ba38 ffffffff84563ac0 ffffffff81961d7c ffffffff81b33a05
[ 49.730033] ffff8800365c0000 ffff8800365c0100 ffff88003621baa8 ffffffff81961d7c
[ 49.730033] Call Trace:
[ 49.730033] do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[ 49.730033] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[ 49.730033] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 49.730033] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[ 49.730033] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 49.730033] ? __const_udelay (arch/x86/lib/delay.c:126)
[ 49.730033] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[ 49.730033] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[ 49.730033] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[ 49.730033] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[ 49.730033] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[ 49.730033] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] do_one_initcall (init/main.c:791)
[ 49.730033] ? parse_args (kernel/params.c:120 kernel/params.c:205)
[ 49.730033] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[ 49.730033] ? loglevel (init/main.c:241)
[ 49.730033] ? rest_init (init/main.c:932)
[ 49.730033] kernel_init (init/main.c:937)
[ 49.730033] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[ 49.730033] ? rest_init (init/main.c:932)
[ 49.730033] Code: 1f 00 48 89 01 31 c0 0f 1f 00 c3 b8 f2 ff ff ff 0f 1f 00 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 f0 ff 07 f3 90 <83> 3f 01 75 f9 f0 ff 0f 75 f1 5d c3 66 66 2e 0f 1f 84 00 00 00
All code
========
0: 1f (bad)
1: 00 48 89 add %cl,-0x77(%rax)
4: 01 31 add %esi,(%rcx)
6: c0 0f 1f rorb $0x1f,(%rdi)
9: 00 c3 add %al,%bl
b: b8 f2 ff ff ff mov $0xfffffff2,%eax
10: 0f 1f 00 nopl (%rax)
13: c3 retq
14: 90 nop
15: 90 nop
16: 90 nop
17: 90 nop
18: 90 nop
19: 90 nop
1a: 90 nop
1b: 90 nop
1c: 90 nop
1d: 90 nop
1e: 90 nop
1f: 90 nop
20: 90 nop
21: 90 nop
22: 55 push %rbp
23: 48 89 e5 mov %rsp,%rbp
26: f0 ff 07 lock incl (%rdi)
29: f3 90 pause
2b:* 83 3f 01 cmpl $0x1,(%rdi) <-- trapping instruction
2e: 75 f9 jne 0x29
30: f0 ff 0f lock decl (%rdi)
33: 75 f1 jne 0x26
35: 5d pop %rbp
36: c3 retq
37: 66 data16
38: 66 data16
39: 2e cs
3a: 0f .byte 0xf
3b: 1f (bad)
3c: 84 00 test %al,(%rax)
3e: 00 00 add %al,(%rax)
...

Code starting with the faulting instruction
===========================================
0: 83 3f 01 cmpl $0x1,(%rdi)
3: 75 f9 jne 0xfffffffffffffffe
5: f0 ff 0f lock decl (%rdi)
8: 75 f1 jne 0xfffffffffffffffb
a: 5d pop %rbp
b: c3 retq
c: 66 data16
d: 66 data16
e: 2e cs
f: 0f .byte 0xf
10: 1f (bad)
11: 84 00 test %al,(%rax)
13: 00 00 add %al,(%rax)
...
[ 49.730033] Kernel panic - not syncing: softlockup: hung tasks
[ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
[ 49.730033] ffff880628550000 ffff8800a6e03dd8 ffffffff8451770c 0000000000000001
[ 49.730033] ffffffff856ec784 ffff8800a6e03e58 ffffffff8450952f 0000000000003556
[ 49.730033] ffff880600000008 ffff8800a6e03e68 ffff8800a6e03e08 000000000000353e
[ 49.730033] Call Trace:
[ 49.730033] <IRQ> dump_stack (lib/dump_stack.c:52)
[ 49.730033] panic (kernel/panic.c:119)
[ 49.730033] watchdog_timer_fn (kernel/watchdog.c:372)
[ 49.730033] __run_hrtimer (kernel/hrtimer.c:1268 (discriminator 2))
[ 49.730033] ? watchdog (kernel/hung_task.c:191 kernel/hung_task.c:232)
[ 49.730033] hrtimer_interrupt (kernel/hrtimer.c:1915)
[ 49.730033] local_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:921)
[ 49.730033] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[ 49.730033] smp_apic_timer_interrupt (./arch/x86/include/asm/apic.h:696 arch/x86/kernel/apic/apic.c:945)
[ 49.730033] apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[ 49.730033] <EOI> ? retint_restore_args (arch/x86/kernel/entry_64.S:829)
[ 49.730033] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[ 49.730033] ? __write_lock_failed (arch/x86/lib/rwlock.S:20)
[ 49.730033] do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[ 49.730033] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[ 49.730033] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 49.730033] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[ 49.730033] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 49.730033] ? __const_udelay (arch/x86/lib/delay.c:126)
[ 49.730033] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[ 49.730033] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[ 49.730033] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[ 49.730033] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[ 49.730033] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[ 49.730033] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[ 49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[ 49.730033] do_one_initcall (init/main.c:791)
[ 49.730033] ? parse_args (kernel/params.c:120 kernel/params.c:205)
[ 49.730033] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[ 49.730033] ? loglevel (init/main.c:241)
[ 49.730033] ? rest_init (init/main.c:932)
[ 49.730033] kernel_init (init/main.c:937)
[ 49.730033] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[ 49.730033] ? rest_init (init/main.c:932)
[ 49.730033] Dumping ftrace buffer:
[ 49.730033] (ftrace buffer empty)
[ 49.730033] Kernel Offset: 0x0 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffff9fffffff)


Thanks,
Sasha


2014-06-09 15:57:01

by Chris Mason

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests

On 06/09/2014 11:16 AM, Sasha Levin wrote:
> Hi all,
>
> It seems that some recent changes to btrfs tests make it hang during boot:
>
> [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
> [ 49.730033] Modules linked in:
> [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
> [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
> [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
> [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
> [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597


This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
tests were working for me.

-chris

2014-06-09 16:18:00

by Sasha Levin

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests

On 06/09/2014 11:59 AM, Chris Mason wrote:
> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>> > Hi all,
>> >
>> > It seems that some recent changes to btrfs tests make it hang during boot:
>> >
>> > [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>> > [ 49.730033] Modules linked in:
>> > [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>> > [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>> > [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>> > [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>> > [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>
> This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
> tests were working for me.

Yes, it's the latest -next tree available.

Also note that it doesn't happen every time, so might be some sort of a race?


Thanks,
Sasha

2014-06-10 11:14:26

by Ed Tomlinson

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests

On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
> On 06/09/2014 11:59 AM, Chris Mason wrote:
> > On 06/09/2014 11:16 AM, Sasha Levin wrote:
> >> > Hi all,
> >> >
> >> > It seems that some recent changes to btrfs tests make it hang during boot:
> >> >
> >> > [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
> >> > [ 49.730033] Modules linked in:
> >> > [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
> >> > [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
> >> > [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
> >> > [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
> >> > [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
> >
> > This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
> > tests were working for me.
>
> Yes, it's the latest -next tree available.
>
> Also note that it doesn't happen every time, so might be some sort of a race?

I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
I have not seen anything in logs. Might this be related?

Thanks,

Ed Tomlinson

2014-06-10 13:24:21

by Chris Mason

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests



On 06/10/2014 07:14 AM, Ed Tomlinson wrote:
> On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>> On 06/09/2014 11:59 AM, Chris Mason wrote:
>>> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>>>>> Hi all,
>>>>>
>>>>> It seems that some recent changes to btrfs tests make it hang during boot:
>>>>>
>>>>> [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>>>>> [ 49.730033] Modules linked in:
>>>>> [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>>>>> [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>>>>> [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>>>>> [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>>>>> [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>>>
>>> This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
>>> tests were working for me.
>>
>> Yes, it's the latest -next tree available.
>>
>> Also note that it doesn't happen every time, so might be some sort of a race?
>
> I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
> I have not seen anything in logs. Might this be related?

It shouldn't be, the lockup Sasha hit is only in the self testing code,
and he's triggering it in the qgroups self tests.

Do you have CONFIG_BTRFS_FS_RUN_SANITY_TESTS=y?

I'd love a sysrq-t or sysrq-w while you're stuck.

-chris

2014-06-11 23:15:00

by Filipe Manana

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests

On Tue, Jun 10, 2014 at 12:14 PM, Ed Tomlinson <[email protected]> wrote:
> On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>> On 06/09/2014 11:59 AM, Chris Mason wrote:
>> > On 06/09/2014 11:16 AM, Sasha Levin wrote:
>> >> > Hi all,
>> >> >
>> >> > It seems that some recent changes to btrfs tests make it hang during boot:
>> >> >
>> >> > [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>> >> > [ 49.730033] Modules linked in:
>> >> > [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>> >> > [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>> >> > [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>> >> > [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>> >> > [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>> >
>> > This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
>> > tests were working for me.
>>
>> Yes, it's the latest -next tree available.
>>
>> Also note that it doesn't happen every time, so might be some sort of a race?
>
> I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
> I have not seen anything in logs. Might this be related?

Hi Ed,

I think I ran into this too.
This patch should help you too: https://patchwork.kernel.org/patch/4338641/

thanks

>
> Thanks,
>
> Ed Tomlinson
> --
> To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
> the body of a message to [email protected]
> More majordomo info at http://vger.kernel.org/majordomo-info.html



--
Filipe David Manana,

"Reasonable men adapt themselves to the world.
Unreasonable men adapt the world to themselves.
That's why all progress depends on unreasonable men."

2014-06-12 16:02:35

by Sasha Levin

[permalink] [raw]
Subject: Re: btrfs: hang on boot due to tests

On 06/10/2014 09:26 AM, Chris Mason wrote:
> On 06/10/2014 07:14 AM, Ed Tomlinson wrote:
>> > On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>>> >> On 06/09/2014 11:59 AM, Chris Mason wrote:
>>>> >>> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>>>>>> >>>>> Hi all,
>>>>>> >>>>>
>>>>>> >>>>> It seems that some recent changes to btrfs tests make it hang during boot:
>>>>>> >>>>>
>>>>>> >>>>> [ 49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>>>>>> >>>>> [ 49.730033] Modules linked in:
>>>>>> >>>>> [ 49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>>>>>> >>>>> [ 49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>>>>>> >>>>> [ 49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>>>>>> >>>>> [ 49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>>>>>> >>>>> [ 49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>>>> >>>
>>>> >>> This is 3.15-rc8 + linux-next? I'll try to reproduce here, but the
>>>> >>> tests were working for me.
>>> >>
>>> >> Yes, it's the latest -next tree available.
>>> >>
>>> >> Also note that it doesn't happen every time, so might be some sort of a race?
>> >
>> > I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
>> > I have not seen anything in logs. Might this be related?
> It shouldn't be, the lockup Sasha hit is only in the self testing code,
> and he's triggering it in the qgroups self tests.
>
> Do you have CONFIG_BTRFS_FS_RUN_SANITY_TESTS=y?

Yup.

> I'd love a sysrq-t or sysrq-w while you're stuck.

It's not a sysrq, but I've enabled softlockup_all_cpu_backtrace and got this:

[ 60.233443] NMI watchdog: BUG: soft lockup - CPU#10 stuck for 23s! [swapper/0:1]
[ 60.233443] Modules linked in:
[ 60.233443] irq event stamp: 7251604
[ 60.233443] hardirqs last enabled at (7251603): restore_args (arch/x86/kernel/entry_64.S:829)
[ 60.233443] hardirqs last disabled at (7251604): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[ 60.233443] softirqs last enabled at (7251602): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
[ 60.233443] softirqs last disabled at (7251597): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
[ 60.233443] CPU: 10 PID: 1 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.233443] task: ffff8803d68c8000 ti: ffff880036220000 task.ti: ffff880036220000
[ 60.233443] RIP: queue_write_lock_slowpath (./arch/x86/include/asm/processor.h:691 ./arch/x86/include/asm/processor.h:696 kernel/locking/qrwlock.c:128)
[ 60.233443] RSP: 0000:ffff8800362239f0 EFLAGS: 00000206
[ 60.233443] RAX: 0000000000000101 RBX: ffffffff90560c3b RCX: 00000000000000ff
[ 60.233443] RDX: ffff88017c1680b8 RSI: 0000000000000101 RDI: ffff88017c1680bc
[ 60.233443] RBP: ffff880036223a08 R08: 000000000000eb46 R09: ffffffff8d95b478
[ 60.233443] R10: 0000000000000001 R11: 0000000000000000 R12: ffff880036223968
[ 60.233443] R13: 0000000000000001 R14: ffff880036220000 R15: ffff8803d68c8000
[ 60.233443] FS: 0000000000000000(0000) GS:ffff880292e00000(0000) knlGS:0000000000000000
[ 60.233443] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.233443] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.233443] Stack:
[ 60.233443] ffffffff8d1d1cc7 ffff880036223a68 ffff88017c1680b8 ffff880036223a38
[ 60.233443] ffffffff9055edf0 ffffffff8d95b93c ffffffff8db2d845 ffff88017c168000
[ 60.233443] ffff88017c168100 ffff880036223aa8 ffffffff8d95b93c ffff880036223a58
[ 60.233443] Call Trace:
[ 60.233443] ? do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[ 60.233443] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[ 60.233443] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 60.233443] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[ 60.233443] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 60.233443] ? __const_udelay (arch/x86/lib/delay.c:126)
[ 60.233443] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[ 60.233443] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[ 60.233443] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[ 60.233443] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[ 60.233443] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[ 60.233443] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] do_one_initcall (init/main.c:791)
[ 60.233443] ? parse_args (kernel/params.c:101 kernel/params.c:205)
[ 60.233443] ? rmi_driver_init (drivers/hid/hid-saitek.c:197)
[ 60.233443] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[ 60.233443] ? loglevel (init/main.c:241)
[ 60.233443] ? rest_init (init/main.c:932)
[ 60.233443] kernel_init (init/main.c:937)
[ 60.233443] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[ 60.233443] ? rest_init (init/main.c:932)
[ 60.233443] Code: 89 ce 89 c8 83 ce 01 f0 0f b1 32 39 c1 74 0b f3 90 eb e7 0f 1f 80 00 00 00 00 b9 ff 00 00 00 0f 1f 00 8b 02 83 f8 01 74 09 f3 90 <eb> f5 0f 1f 44 00 00 f0 0f b1 0a 83 f8 01 75 ee e9 1a 00 00 00
All code
========
0: 89 ce mov %ecx,%esi
2: 89 c8 mov %ecx,%eax
4: 83 ce 01 or $0x1,%esi
7: f0 0f b1 32 lock cmpxchg %esi,(%rdx)
b: 39 c1 cmp %eax,%ecx
d: 74 0b je 0x1a
f: f3 90 pause
11: eb e7 jmp 0xfffffffffffffffa
13: 0f 1f 80 00 00 00 00 nopl 0x0(%rax)
1a: b9 ff 00 00 00 mov $0xff,%ecx
1f: 0f 1f 00 nopl (%rax)
22: 8b 02 mov (%rdx),%eax
24: 83 f8 01 cmp $0x1,%eax
27: 74 09 je 0x32
29: f3 90 pause
2b:* eb f5 jmp 0x22 <-- trapping instruction
2d: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
32: f0 0f b1 0a lock cmpxchg %ecx,(%rdx)
36: 83 f8 01 cmp $0x1,%eax
39: 75 ee jne 0x29
3b: e9 1a 00 00 00 jmpq 0x5a
...

Code starting with the faulting instruction
===========================================
0: eb f5 jmp 0xfffffffffffffff7
2: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
7: f0 0f b1 0a lock cmpxchg %ecx,(%rdx)
b: 83 f8 01 cmp $0x1,%eax
e: 75 ee jne 0xfffffffffffffffe
10: e9 1a 00 00 00 jmpq 0x2f
...
[ 60.233443] sending NMI to other CPUs:
[ 60.272505] NMI backtrace for cpu 0
[ 60.272505] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.272505] task: ffffffff920354c0 ti: ffffffff92000000 task.ti: ffffffff92000000
[ 60.272505] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.272505] RSP: 0000:ffffffff92003e38 EFLAGS: 00000282
[ 60.272505] RAX: ffffffff920354c0 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.272505] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.272505] RBP: ffffffff92003e38 R08: 0000000000000000 R09: 0000000000000000
[ 60.272505] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.272505] R13: 00000000ffffffed R14: ffffffff92000000 R15: 00000000000146e0
[ 60.272505] FS: 0000000000000000(0000) GS:ffff880036e00000(0000) knlGS:0000000000000000
[ 60.272505] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.272505] CR2: 0000000000000000 CR3: 000000001202e000 CR4: 00000000000006b0
[ 60.272505] Stack:
[ 60.272505] ffffffff92003e58 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.272505] ffffffff92003e68 ffffffff8d07e59f ffffffff92003ee8 ffffffff8d1bc7d9
[ 60.272505] 0000000000000000 8dae92129a185908 ffffffff92003fd8 0000000000000002
[ 60.272505] Call Trace:
[ 60.272505] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.272505] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.272505] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.272505] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.272505] cpu_startup_entry (??:?)
[ 60.272505] rest_init (init/main.c:419)
[ 60.272505] ? rest_init (init/main.c:394)
[ 60.272505] start_kernel (init/main.c:681)
[ 60.272505] ? set_init_arg (init/main.c:281)
[ 60.272505] ? early_idt_handlers (arch/x86/kernel/head_64.S:340)
[ 60.272505] x86_64_start_reservations (arch/x86/kernel/head64.c:194)
[ 60.272505] x86_64_start_kernel (arch/x86/kernel/head64.c:183)
[ 60.272505] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268631] NMI backtrace for cpu 3
[ 60.307779] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 34.316 msecs
[ 60.268631] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.268631] task: ffff8800a6590000 ti: ffff880035e1c000 task.ti: ffff880035e1c000
[ 60.268631] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.268631] RSP: 0000:ffff880035e1fe28 EFLAGS: 00000282
[ 60.268631] RAX: ffff8800a6590000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.268631] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.268631] RBP: ffff880035e1fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.268631] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.268631] R13: 00000000ffffffed R14: ffff880035e1c000 R15: 0000000000000000
[ 60.268631] FS: 0000000000000000(0000) GS:ffff88010ce00000(0000) knlGS:0000000000000000
[ 60.268631] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.268631] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.268631] Stack:
[ 60.268631] ffff880035e1fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.268631] ffff880035e1fe58 ffffffff8d07e59f ffff880035e1fed8 ffffffff8d1bc7d9
[ 60.268631] 0000000000000000 ca4cdd68daa1d2ae ffff880035e1ffd8 000000000000f000
[ 60.268631] Call Trace:
[ 60.268631] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.268631] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.268631] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.268631] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.268631] cpu_startup_entry (??:?)
[ 60.268631] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268631] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268642] NMI backtrace for cpu 17
[ 60.359741] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 86.152 msecs
[ 60.268642] CPU: 17 PID: 0 Comm: swapper/17 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.268642] task: ffff8801b45a8000 ti: ffff880035e68000 task.ti: ffff880035e68000
[ 60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.268642] RSP: 0000:ffff880035e6be28 EFLAGS: 00000282
[ 60.268642] RAX: ffff8801b45a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.268642] RBP: ffff880035e6be28 R08: 0000000000000000 R09: 0000000000000000
[ 60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.268642] R13: 00000000ffffffed R14: ffff880035e68000 R15: 0000000000000000
[ 60.268642] FS: 0000000000000000(0000) GS:ffff88040ce00000(0000) knlGS:0000000000000000
[ 60.268642] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.268642] Stack:
[ 60.268642] ffff880035e6be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.268642] ffff880035e6be58 ffffffff8d07e59f ffff880035e6bed8 ffffffff8d1bc7d9
[ 60.268642] 0000000000000000 ea943b0e542482c0 ffff880035e6bfd8 000000000000f000
[ 60.268642] Call Trace:
[ 60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.268642] cpu_startup_entry (??:?)
[ 60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268642] NMI backtrace for cpu 14
[ 60.403409] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 129.784 msecs
[ 60.268642] CPU: 14 PID: 0 Comm: swapper/14 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.268642] task: ffff88036a5b0000 ti: ffff880035e58000 task.ti: ffff880035e58000
[ 60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.268642] RSP: 0000:ffff880035e5be28 EFLAGS: 00000282
[ 60.268642] RAX: ffff88036a5b0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.268642] RBP: ffff880035e5be28 R08: 0000000000000000 R09: 0000000000000000
[ 60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.268642] R13: 00000000ffffffed R14: ffff880035e58000 R15: 0000000000000000
[ 60.268642] FS: 0000000000000000(0000) GS:ffff88036ae00000(0000) knlGS:0000000000000000
[ 60.268642] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.268642] Stack:
[ 60.268642] ffff880035e5be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.268642] ffff880035e5be58 ffffffff8d07e59f ffff880035e5bed8 ffffffff8d1bc7d9
[ 60.268642] 0000000000000000 99bf70d8d7246944 ffff880035e5bfd8 000000000000f000
[ 60.268642] Call Trace:
[ 60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.268642] cpu_startup_entry (??:?)
[ 60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268642] NMI backtrace for cpu 7
[ 60.436531] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 162.898 msecs
[ 60.268642] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.268642] task: ffff8802925a8000 ti: ffff880035e30000 task.ti: ffff880035e30000
[ 60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.268642] RSP: 0000:ffff880035e33e28 EFLAGS: 00000282
[ 60.268642] RAX: ffff8802925a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.268642] RBP: ffff880035e33e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.268642] R13: 00000000ffffffed R14: ffff880035e30000 R15: 0000000000000000
[ 60.268642] FS: 0000000000000000(0000) GS:ffff8801ece00000(0000) knlGS:0000000000000000
[ 60.268642] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.268642] Stack:
[ 60.268642] ffff880035e33e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.268642] ffff880035e33e58 ffffffff8d07e59f ffff880035e33ed8 ffffffff8d1bc7d9
[ 60.268642] 0000000000000000 39ab99d7099f72a0 ffff880035e33fd8 000000000000f000
[ 60.268642] Call Trace:
[ 60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.268642] cpu_startup_entry (??:?)
[ 60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268642] NMI backtrace for cpu 23
[ 60.472952] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 199.295 msecs
[ 60.268642] CPU: 23 PID: 0 Comm: swapper/23 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.268642] task: ffff88025c5c0000 ti: ffff880035e80000 task.ti: ffff880035e80000
[ 60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.268642] RSP: 0000:ffff880035e83e28 EFLAGS: 00000282
[ 60.268642] RAX: ffff88025c5c0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.268642] RBP: ffff880035e83e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.268642] R13: 00000000ffffffed R14: ffff880035e80000 R15: 0000000000000000
[ 60.268642] FS: 0000000000000000(0000) GS:ffff880550e00000(0000) knlGS:0000000000000000
[ 60.268642] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.268642] Stack:
[ 60.268642] ffff880035e83e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.268642] ffff880035e83e58 ffffffff8d07e59f ffff880035e83ed8 ffffffff8d1bc7d9
[ 60.268642] 0000000000000000 273c2f151685900e ffff880035e83fd8 000000000000f000
[ 60.268642] Call Trace:
[ 60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.268642] cpu_startup_entry (??:?)
[ 60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.269373] NMI backtrace for cpu 1
[ 60.502478] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 228.823 msecs
[ 60.269373] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.269373] task: ffff880550588000 ti: ffff880035e10000 task.ti: ffff880035e10000
[ 60.269373] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.269373] RSP: 0000:ffff880035e13e28 EFLAGS: 00000282
[ 60.269373] RAX: ffff880550588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.269373] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.269373] RBP: ffff880035e13e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.269373] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.269373] R13: 00000000ffffffed R14: ffff880035e10000 R15: 0000000000000000
[ 60.269373] FS: 0000000000000000(0000) GS:ffff88006ee00000(0000) knlGS:0000000000000000
[ 60.269373] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.269373] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.269373] Stack:
[ 60.269373] ffff880035e13e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.269373] ffff880035e13e58 ffffffff8d07e59f ffff880035e13ed8 ffffffff8d1bc7d9
[ 60.269373] 0000000000000000 b57caad4e27916fc ffff880035e13fd8 000000000000f000
[ 60.269373] Call Trace:
[ 60.269373] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.269373] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.269373] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.269373] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.269373] cpu_startup_entry (??:?)
[ 60.269373] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.269373] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.268642] NMI backtrace for cpu 18
[ 60.535232] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 261.527 msecs
[ 60.535725] CPU: 18 PID: 0 Comm: swapper/18 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.535725] task: ffff8802fe920000 ti: ffff880035e6c000 task.ti: ffff880035e6c000
[ 60.535725] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.535725] RSP: 0000:ffff880035e6fe28 EFLAGS: 00000282
[ 60.535725] RAX: ffff8802fe920000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.535725] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.535725] RBP: ffff880035e6fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.535725] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.535725] R13: 00000000ffffffed R14: ffff880035e6c000 R15: 0000000000000000
[ 60.535725] FS: 0000000000000000(0000) GS:ffff880442e00000(0000) knlGS:0000000000000000
[ 60.535725] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.535725] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.535725] Stack:
[ 60.535725] ffff880035e6fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.535725] ffff880035e6fe58 ffffffff8d07e59f ffff880035e6fed8 ffffffff8d1bc7d9
[ 60.535725] 0000000000000000 3f9d843d2cfb1974 ffff880035e6ffd8 000000000000f000
[ 60.535725] Call Trace:
[ 60.535725] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.535725] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.535725] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.535725] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.535725] cpu_startup_entry (??:?)
[ 60.535725] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.535725] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.535673] NMI backtrace for cpu 11
[ 60.566960] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 293.259 msecs
[ 60.567405] CPU: 11 PID: 0 Comm: swapper/11 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.567405] task: ffff880442588000 ti: ffff880035e44000 task.ti: ffff880035e44000
[ 60.567405] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.567405] RSP: 0000:ffff880035e47e28 EFLAGS: 00000282
[ 60.567405] RAX: ffff880442588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.567405] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.567405] RBP: ffff880035e47e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.567405] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.567405] R13: 00000000ffffffed R14: ffff880035e44000 R15: 0000000000000000
[ 60.567405] FS: 0000000000000000(0000) GS:ffff8802c8e00000(0000) knlGS:0000000000000000
[ 60.567405] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.567405] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.567405] Stack:
[ 60.567405] ffff880035e47e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.567405] ffff880035e47e58 ffffffff8d07e59f ffff880035e47ed8 ffffffff8d1bc7d9
[ 60.567405] 0000000000000000 474f47db85fac2c5 ffff880035e47fd8 000000000000f000
[ 60.567405] Call Trace:
[ 60.567405] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.567405] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.567405] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.567405] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.567405] cpu_startup_entry (??:?)
[ 60.567405] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.567405] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.567405] NMI backtrace for cpu 21
[ 60.594485] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 320.725 msecs
[ 60.594943] CPU: 21 PID: 0 Comm: swapper/21 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.594943] task: ffff880694990000 ti: ffff880035e78000 task.ti: ffff880035e78000
[ 60.594943] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.594943] RSP: 0000:ffff880035e7be28 EFLAGS: 00000282
[ 60.594943] RAX: ffff880694990000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.594943] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.594943] RBP: ffff880035e7be28 R08: 0000000000000000 R09: 0000000000000000
[ 60.594943] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.594943] R13: 00000000ffffffed R14: ffff880035e78000 R15: 0000000000000000
[ 60.594943] FS: 0000000000000000(0000) GS:ffff8804e4e00000(0000) knlGS:0000000000000000
[ 60.594943] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.594943] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.594943] Stack:
[ 60.594943] ffff880035e7be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.594943] ffff880035e7be58 ffffffff8d07e59f ffff880035e7bed8 ffffffff8d1bc7d9
[ 60.594943] 0000000000000000 3fe10556820a9b9b ffff880035e7bfd8 000000000000f000
[ 60.594943] Call Trace:
[ 60.594943] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.594943] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.594943] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.594943] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.594943] cpu_startup_entry (??:?)
[ 60.594943] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.594943] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.594943] NMI backtrace for cpu 4
[ 60.626228] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 352.459 msecs
[ 60.626914] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.626914] task: ffff8801b4588000 ti: ffff880035e20000 task.ti: ffff880035e20000
[ 60.626914] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.626914] RSP: 0000:ffff880035e23e28 EFLAGS: 00000282
[ 60.626914] RAX: ffff8801b4588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.626914] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.626914] RBP: ffff880035e23e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.626914] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.626914] R13: 00000000ffffffed R14: ffff880035e20000 R15: 0000000000000000
[ 60.626914] FS: 0000000000000000(0000) GS:ffff880144e00000(0000) knlGS:0000000000000000
[ 60.626914] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.626914] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.626914] Stack:
[ 60.626914] ffff880035e23e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.626914] ffff880035e23e58 ffffffff8d07e59f ffff880035e23ed8 ffffffff8d1bc7d9
[ 60.626914] 0000000000000000 7e2449b239d10efa ffff880035e23fd8 000000000000f000
[ 60.626914] Call Trace:
[ 60.626914] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.626914] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.626914] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.626914] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.626914] cpu_startup_entry (??:?)
[ 60.626914] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.626914] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.626914] NMI backtrace for cpu 15
[ 60.656449] CPU: 15 PID: 0 Comm: swapper/15 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.656449] task: ffff88051a5b0000 ti: ffff880035e5c000 task.ti: ffff880035e5c000
[ 60.656449] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.656449] RSP: 0000:ffff880035e5fe28 EFLAGS: 00000282
[ 60.656449] RAX: ffff88051a5b0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.656449] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.656449] RBP: ffff880035e5fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.656449] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.656449] R13: 00000000ffffffed R14: ffff880035e5c000 R15: 0000000000000000
[ 60.656449] FS: 0000000000000000(0000) GS:ffff8803a0e00000(0000) knlGS:0000000000000000
[ 60.656449] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.656449] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.656449] Stack:
[ 60.656449] ffff880035e5fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.656449] ffff880035e5fe58 ffffffff8d07e59f ffff880035e5fed8 ffffffff8d1bc7d9
[ 60.656449] 0000000000000000 b64a2bfca327b7ec ffff880035e5ffd8 000000000000f000
[ 60.656449] Call Trace:
[ 60.656449] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.656449] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.656449] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.656449] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.656449] cpu_startup_entry (??:?)
[ 60.656449] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.656449] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.656449] NMI backtrace for cpu 22
[ 60.656449] CPU: 22 PID: 0 Comm: swapper/22 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.688896] task: ffff88010c580000 ti: ffff880035e7c000 task.ti: ffff880035e7c000
[ 60.688896] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.688896] RSP: 0000:ffff880035e7fe28 EFLAGS: 00000282
[ 60.688896] RAX: ffff88010c580000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.688896] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.688896] RBP: ffff880035e7fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.688896] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.688896] R13: 00000000ffffffed R14: ffff880035e7c000 R15: 0000000000000000
[ 60.688896] FS: 0000000000000000(0000) GS:ffff88051ae00000(0000) knlGS:0000000000000000
[ 60.688896] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.688896] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.688896] Stack:
[ 60.688896] ffff880035e7fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.688896] ffff880035e7fe58 ffffffff8d07e59f ffff880035e7fed8 ffffffff8d1bc7d9
[ 60.688896] 0000000000000000 31cf8a3f823c253f ffff880035e7ffd8 000000000000f000
[ 60.688896] Call Trace:
[ 60.688896] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.688896] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.688896] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.688896] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.688896] cpu_startup_entry (??:?)
[ 60.688896] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.688896] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.688896] NMI backtrace for cpu 5
[ 60.688896] CPU: 5 PID: 0 Comm: swapper/5 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.720000] task: ffff88036a598000 ti: ffff880035e24000 task.ti: ffff880035e24000
[ 60.720000] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.720000] RSP: 0000:ffff880035e27e28 EFLAGS: 00000282
[ 60.720000] RAX: ffff88036a598000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.720000] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.720000] RBP: ffff880035e27e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.720000] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.720000] R13: 00000000ffffffed R14: ffff880035e24000 R15: 0000000000000000
[ 60.720000] FS: 0000000000000000(0000) GS:ffff88017ce00000(0000) knlGS:0000000000000000
[ 60.720000] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.720000] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.720000] Stack:
[ 60.720000] ffff880035e27e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.720000] ffff880035e27e58 ffffffff8d07e59f ffff880035e27ed8 ffffffff8d1bc7d9
[ 60.720000] 0000000000000000 cf5f6d6484a02f84 ffff880035e27fd8 000000000000f000
[ 60.720000] Call Trace:
[ 60.720000] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.720000] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.720000] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.720000] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.720000] cpu_startup_entry (??:?)
[ 60.720000] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.720000] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.720000] NMI backtrace for cpu 20
[ 60.747526] CPU: 20 PID: 0 Comm: swapper/20 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.747526] task: ffff880550590000 ti: ffff880035e74000 task.ti: ffff880035e74000
[ 60.747526] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.747526] RSP: 0000:ffff880035e77e28 EFLAGS: 00000282
[ 60.747526] RAX: ffff880550590000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.747526] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.747526] RBP: ffff880035e77e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.747526] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.747526] R13: 00000000ffffffed R14: ffff880035e74000 R15: 0000000000000000
[ 60.747526] FS: 0000000000000000(0000) GS:ffff8804af000000(0000) knlGS:0000000000000000
[ 60.747526] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.747526] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.747526] Stack:
[ 60.747526] ffff880035e77e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.747526] ffff880035e77e58 ffffffff8d07e59f ffff880035e77ed8 ffffffff8d1bc7d9
[ 60.747526] 0000000000000000 bf85bc695f3528e6 ffff880035e77fd8 000000000000f000
[ 60.747526] Call Trace:
[ 60.747526] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.747526] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.747526] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.747526] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.747526] cpu_startup_entry (??:?)
[ 60.747526] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.747526] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.747526] NMI backtrace for cpu 13
[ 60.747526] CPU: 13 PID: 0 Comm: swapper/13 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.783369] task: ffff8801b45a0000 ti: ffff880035e4c000 task.ti: ffff880035e4c000
[ 60.783369] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.783369] RSP: 0000:ffff880035e4fe28 EFLAGS: 00000282
[ 60.783369] RAX: ffff8801b45a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.783369] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.783369] RBP: ffff880035e4fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.783369] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.783369] R13: 00000000ffffffed R14: ffff880035e4c000 R15: 0000000000000000
[ 60.783369] FS: 0000000000000000(0000) GS:ffff880334e00000(0000) knlGS:0000000000000000
[ 60.783369] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.783369] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.783369] Stack:
[ 60.783369] ffff880035e4fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.783369] ffff880035e4fe58 ffffffff8d07e59f ffff880035e4fed8 ffffffff8d1bc7d9
[ 60.783369] 0000000000000000 e2f60941915f5a68 ffff880035e4ffd8 000000000000f000
[ 60.783369] Call Trace:
[ 60.783369] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.783369] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.783369] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.783369] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.783369] cpu_startup_entry (??:?)
[ 60.783369] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.783369] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.783369] NMI backtrace for cpu 9
[ 60.783369] CPU: 9 PID: 0 Comm: swapper/9 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.783369] task: ffff8800a65a0000 ti: ffff880035e3c000 task.ti: ffff880035e3c000
[ 60.783369] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.783369] RSP: 0000:ffff880035e3fe28 EFLAGS: 00000282
[ 60.783369] RAX: ffff8800a65a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.783369] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.783369] RBP: ffff880035e3fe28 R08: 0000000000000000 R09: 0000000000000000
[ 60.783369] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.783369] R13: 00000000ffffffed R14: ffff880035e3c000 R15: 0000000000000000
[ 60.783369] FS: 0000000000000000(0000) GS:ffff88025ce00000(0000) knlGS:0000000000000000
[ 60.783369] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.783369] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.783369] Stack:
[ 60.783369] ffff880035e3fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.783369] ffff880035e3fe58 ffffffff8d07e59f ffff880035e3fed8 ffffffff8d1bc7d9
[ 60.783369] 0000000000000000 127cf1a0cc1cba84 ffff880035e3ffd8 000000000000f000
[ 60.783369] Call Trace:
[ 60.783369] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.783369] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.783369] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.783369] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.783369] cpu_startup_entry (??:?)
[ 60.783369] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.783369] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.783369] NMI backtrace for cpu 8
[ 60.783369] CPU: 8 PID: 0 Comm: swapper/8 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.857533] task: ffff88051a5a0000 ti: ffff880035e34000 task.ti: ffff880035e34000
[ 60.857533] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.857533] RSP: 0000:ffff880035e37e28 EFLAGS: 00000282
[ 60.857533] RAX: ffff88051a5a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.857533] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.857533] RBP: ffff880035e37e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.857533] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.857533] R13: 00000000ffffffed R14: ffff880035e34000 R15: 0000000000000000
[ 60.857533] FS: 0000000000000000(0000) GS:ffff880224e00000(0000) knlGS:0000000000000000
[ 60.857533] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.857533] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.857533] Stack:
[ 60.857533] ffff880035e37e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.857533] ffff880035e37e58 ffffffff8d07e59f ffff880035e37ed8 ffffffff8d1bc7d9
[ 60.857533] 0000000000000000 eb8449bb992ae2a3 ffff880035e37fd8 000000000000f000
[ 60.857533] Call Trace:
[ 60.857533] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.857533] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.857533] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.857533] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.857533] cpu_startup_entry (??:?)
[ 60.857533] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.857533] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.857533] NMI backtrace for cpu 19
[ 60.857533] CPU: 19 PID: 0 Comm: swapper/19 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.895459] task: ffff880442598000 ti: ffff880035e70000 task.ti: ffff880035e70000
[ 60.895459] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.895459] RSP: 0000:ffff880035e73e28 EFLAGS: 00000282
[ 60.895459] RAX: ffff880442598000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.895459] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.895459] RBP: ffff880035e73e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.895459] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.895459] R13: 00000000ffffffed R14: ffff880035e70000 R15: 0000000000000000
[ 60.895459] FS: 0000000000000000(0000) GS:ffff880478e00000(0000) knlGS:0000000000000000
[ 60.895459] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.895459] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.895459] Stack:
[ 60.895459] ffff880035e73e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.895459] ffff880035e73e58 ffffffff8d07e59f ffff880035e73ed8 ffffffff8d1bc7d9
[ 60.895459] 0000000000000000 5e9a969615b783f5 ffff880035e73fd8 000000000000f000
[ 60.895459] Call Trace:
[ 60.895459] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.895459] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.895459] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.895459] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.895459] cpu_startup_entry (??:?)
[ 60.895459] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.895459] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.895459] NMI backtrace for cpu 16
[ 60.895459] CPU: 16 PID: 0 Comm: swapper/16 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.928936] task: ffff8806ca9a8000 ti: ffff880035e60000 task.ti: ffff880035e60000
[ 60.928936] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.928936] RSP: 0000:ffff880035e63e28 EFLAGS: 00000282
[ 60.928936] RAX: ffff8806ca9a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.928936] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.928936] RBP: ffff880035e63e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.928936] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.928936] R13: 00000000ffffffed R14: ffff880035e60000 R15: 0000000000000000
[ 60.928936] FS: 0000000000000000(0000) GS:ffff8803d7000000(0000) knlGS:0000000000000000
[ 60.928936] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.928936] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.928936] Stack:
[ 60.928936] ffff880035e63e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.928936] ffff880035e63e58 ffffffff8d07e59f ffff880035e63ed8 ffffffff8d1bc7d9
[ 60.928936] 0000000000000000 eb01a73bc8ea8b3b ffff880035e63fd8 000000000000f000
[ 60.928936] Call Trace:
[ 60.928936] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.928936] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.928936] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.928936] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.928936] cpu_startup_entry (??:?)
[ 60.928936] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.928936] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.928901] NMI backtrace for cpu 2
[ 60.928901] CPU: 2 PID: 0 Comm: swapper/2 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.957846] task: ffff880694988000 ti: ffff880035e14000 task.ti: ffff880035e14000
[ 60.957846] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.957846] RSP: 0000:ffff880035e17e28 EFLAGS: 00000282
[ 60.957846] RAX: ffff880694988000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.957846] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.957846] RBP: ffff880035e17e28 R08: 0000000000000000 R09: 0000000000000000
[ 60.957846] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.957846] R13: 00000000ffffffed R14: ffff880035e14000 R15: 0000000000000000
[ 60.957846] FS: 0000000000000000(0000) GS:ffff8800a6e00000(0000) knlGS:0000000000000000
[ 60.957846] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.957846] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.957846] Stack:
[ 60.957846] ffff880035e17e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.957846] ffff880035e17e58 ffffffff8d07e59f ffff880035e17ed8 ffffffff8d1bc7d9
[ 60.957846] 0000000000000000 e58d5ef30e9dc64f ffff880035e17fd8 000000000000f000
[ 60.957846] Call Trace:
[ 60.957846] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.957846] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.957846] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.957846] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.957846] cpu_startup_entry (??:?)
[ 60.957846] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.957846] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.957846] NMI backtrace for cpu 12
[ 60.957846] CPU: 12 PID: 0 Comm: swapper/12 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.998842] task: ffff88065e920000 ti: ffff880035e48000 task.ti: ffff880035e48000
[ 60.998842] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 60.998842] RSP: 0000:ffff880035e4be28 EFLAGS: 00000282
[ 60.998842] RAX: ffff88065e920000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 60.998842] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 60.998842] RBP: ffff880035e4be28 R08: 0000000000000000 R09: 0000000000000000
[ 60.998842] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 60.998842] R13: 00000000ffffffed R14: ffff880035e48000 R15: 0000000000000000
[ 60.998842] FS: 0000000000000000(0000) GS:ffff8802ff000000(0000) knlGS:0000000000000000
[ 60.998842] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 60.998842] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 60.998842] Stack:
[ 60.998842] ffff880035e4be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 60.998842] ffff880035e4be58 ffffffff8d07e59f ffff880035e4bed8 ffffffff8d1bc7d9
[ 60.998842] 0000000000000000 9df861323f902cb6 ffff880035e4bfd8 000000000000f000
[ 60.998842] Call Trace:
[ 60.998842] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 60.998842] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 60.998842] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 60.998842] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 60.998842] cpu_startup_entry (??:?)
[ 60.998842] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.998842] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.998842] NMI backtrace for cpu 6
[ 60.998842] CPU: 6 PID: 0 Comm: swapper/6 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 61.027305] task: ffff88065e910000 ti: ffff880035e28000 task.ti: ffff880035e28000
[ 61.027305] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[ 61.027305] RSP: 0000:ffff880035e2be28 EFLAGS: 00000282
[ 61.027305] RAX: ffff88065e910000 RBX: ffffffff932c9540 RCX: 0000000000000000
[ 61.027305] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[ 61.027305] RBP: ffff880035e2be28 R08: 0000000000000000 R09: 0000000000000000
[ 61.027305] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[ 61.027305] R13: 00000000ffffffed R14: ffff880035e28000 R15: 0000000000000000
[ 61.027305] FS: 0000000000000000(0000) GS:ffff8801b4e00000(0000) knlGS:0000000000000000
[ 61.027305] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 61.027305] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[ 61.027305] Stack:
[ 61.027305] ffff880035e2be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[ 61.027305] ffff880035e2be58 ffffffff8d07e59f ffff880035e2bed8 ffffffff8d1bc7d9
[ 61.027305] 0000000000000000 e4346704a8838ce9 ffff880035e2bfd8 000000000000f000
[ 61.027305] Call Trace:
[ 61.027305] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[ 61.027305] arch_cpu_idle (arch/x86/kernel/process.c:302)
[ 61.027305] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[ 61.027305] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[ 61.027305] cpu_startup_entry (??:?)
[ 61.027305] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 61.027305] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: 00 55 48 add %dl,0x48(%rbp)
7: 89 e5 mov %esp,%ebp
9: fa cli
a: 5d pop %rbp
b: c3 retq
c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
13: 00 00
15: 55 push %rbp
16: 48 89 e5 mov %rsp,%rbp
19: fb sti
1a: 5d pop %rbp
1b: c3 retq
1c: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1)
23: 00 00
25: 55 push %rbp
26: 48 89 e5 mov %rsp,%rbp
29: fb sti
2a: f4 hlt
2b:* 5d pop %rbp <-- trapping instruction
2c: c3 retq
2d: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
34: 00
35: 55 push %rbp
36: 48 89 e5 mov %rsp,%rbp
39: f4 hlt
3a: 5d pop %rbp
3b: c3 retq
3c: 66 data16
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 00 test %al,(%rax)

Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: c3 retq
2: 0f 1f 84 00 00 00 00 nopl 0x0(%rax,%rax,1)
9: 00
a: 55 push %rbp
b: 48 89 e5 mov %rsp,%rbp
e: f4 hlt
f: 5d pop %rbp
10: c3 retq
11: 66 data16
12: 0f .byte 0xf
13: 1f (bad)
14: 84 00 test %al,(%rax)
[ 60.233443] Kernel panic - not syncing: softlockup: hung tasks
[ 60.233443] CPU: 10 PID: 1 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[ 60.233443] ffff8803d68c8000 ffff880292e03dd8 ffffffff90512768 0000000000000001
[ 60.233443] ffffffff916fa8f7 ffff880292e03e58 ffffffff9050433f ffff880292e03e18
[ 60.233443] ffffffff00000008 ffff880292e03e68 ffff880292e03e08 000000000000001a
[ 60.233443] Call Trace:
[ 60.233443] <IRQ> dump_stack (lib/dump_stack.c:52)
[ 60.233443] panic (kernel/panic.c:119)
[ 60.233443] watchdog_timer_fn (kernel/watchdog.c:372)
[ 60.233443] __run_hrtimer (kernel/hrtimer.c:1268 (discriminator 2))
[ 60.233443] ? watchdog (kernel/hung_task.c:191 kernel/hung_task.c:232)
[ 60.233443] hrtimer_interrupt (kernel/hrtimer.c:1915)
[ 60.233443] local_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:921)
[ 60.233443] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[ 60.233443] smp_apic_timer_interrupt (./arch/x86/include/asm/apic.h:696 arch/x86/kernel/apic/apic.c:945)
[ 60.233443] apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[ 60.233443] <EOI> ? retint_restore_args (arch/x86/kernel/entry_64.S:829)
[ 60.233443] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[ 60.233443] ? queue_write_lock_slowpath (./arch/x86/include/asm/processor.h:691 ./arch/x86/include/asm/processor.h:696 kernel/locking/qrwlock.c:128)
[ 60.233443] ? do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[ 60.233443] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[ 60.233443] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 60.233443] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[ 60.233443] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[ 60.233443] ? __const_udelay (arch/x86/lib/delay.c:126)
[ 60.233443] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[ 60.233443] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[ 60.233443] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[ 60.233443] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[ 60.233443] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[ 60.233443] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[ 60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[ 60.233443] do_one_initcall (init/main.c:791)
[ 60.233443] ? parse_args (kernel/params.c:101 kernel/params.c:205)
[ 60.233443] ? rmi_driver_init (drivers/hid/hid-saitek.c:197)
[ 60.233443] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[ 60.233443] ? loglevel (init/main.c:241)
[ 60.233443] ? rest_init (init/main.c:932)
[ 60.233443] kernel_init (init/main.c:937)
[ 60.233443] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[ 60.233443] ? rest_init (init/main.c:932)
[ 60.233443] Dumping ftrace buffer:
[ 60.233443] (ftrace buffer empty)
[ 60.233443] Kernel Offset: 0xc000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 60.233443] Rebooting in 1 seconds..


Thanks,
Sasha