All of lore.kernel.org
 help / color / mirror / Atom feed
* btrfs: hang on boot due to tests
@ 2014-06-09 15:16 Sasha Levin
  2014-06-09 15:59 ` Chris Mason
  0 siblings, 1 reply; 7+ messages in thread
From: Sasha Levin @ 2014-06-09 15:16 UTC (permalink / raw)
  To: Chris Mason, jbacik; +Cc: LKML, Dave Jones, linux-btrfs

Hi all,

It seems that some recent changes to btrfs tests make it hang during boot:

[   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
[   49.730033] Modules linked in:
[   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
[   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
[   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
[   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
[   49.730033] task: ffff880628550000 ti: ffff880036218000 task.ti: ffff880036218000
[   49.730033] RIP: __write_lock_failed (arch/x86/lib/rwlock.S:20)
[   49.730033] RSP: 0000:ffff88003621b9e8  EFLAGS: 00000297
[   49.730033] RAX: 0000000000000022 RBX: ffffffff845658fb RCX: 000000059e1d8462
[   49.730033] RDX: 0000000000000003 RSI: ffffffff85907bf4 RDI: ffff8800365c00bc
[   49.730033] RBP: ffff88003621b9e8 R08: 0000000000001b48 R09: ffffffff819618b8
[   49.730033] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88003621b958
[   49.730033] R13: 0000000000000001 R14: ffff880036218000 R15: ffff880628550000
[   49.730033] FS:  0000000000000000(0000) GS:ffff8800a6e00000(0000) knlGS:0000000000000000
[   49.730033] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   49.730033] CR2: 00000000ffffffff CR3: 000000000602e000 CR4: 00000000000006a0
[   49.730033] Stack:
[   49.730033]  ffff88003621ba08 ffffffff811d18de ffff88003621ba68 ffff8800365c00b8
[   49.730033]  ffff88003621ba38 ffffffff84563ac0 ffffffff81961d7c ffffffff81b33a05
[   49.730033]  ffff8800365c0000 ffff8800365c0100 ffff88003621baa8 ffffffff81961d7c
[   49.730033] Call Trace:
[   49.730033] do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[   49.730033] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[   49.730033] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   49.730033] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[   49.730033] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   49.730033] ? __const_udelay (arch/x86/lib/delay.c:126)
[   49.730033] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[   49.730033] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[   49.730033] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[   49.730033] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[   49.730033] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[   49.730033] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] do_one_initcall (init/main.c:791)
[   49.730033] ? parse_args (kernel/params.c:120 kernel/params.c:205)
[   49.730033] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[   49.730033] ? loglevel (init/main.c:241)
[   49.730033] ? rest_init (init/main.c:932)
[   49.730033] kernel_init (init/main.c:937)
[   49.730033] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[   49.730033] ? rest_init (init/main.c:932)
[ 49.730033] Code: 1f 00 48 89 01 31 c0 0f 1f 00 c3 b8 f2 ff ff ff 0f 1f 00 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 f0 ff 07 f3 90 <83> 3f 01 75 f9 f0 ff 0f 75 f1 5d c3 66 66 2e 0f 1f 84 00 00 00
All code
========
   0:	1f                   	(bad)
   1:	00 48 89             	add    %cl,-0x77(%rax)
   4:	01 31                	add    %esi,(%rcx)
   6:	c0 0f 1f             	rorb   $0x1f,(%rdi)
   9:	00 c3                	add    %al,%bl
   b:	b8 f2 ff ff ff       	mov    $0xfffffff2,%eax
  10:	0f 1f 00             	nopl   (%rax)
  13:	c3                   	retq
  14:	90                   	nop
  15:	90                   	nop
  16:	90                   	nop
  17:	90                   	nop
  18:	90                   	nop
  19:	90                   	nop
  1a:	90                   	nop
  1b:	90                   	nop
  1c:	90                   	nop
  1d:	90                   	nop
  1e:	90                   	nop
  1f:	90                   	nop
  20:	90                   	nop
  21:	90                   	nop
  22:	55                   	push   %rbp
  23:	48 89 e5             	mov    %rsp,%rbp
  26:	f0 ff 07             	lock incl (%rdi)
  29:	f3 90                	pause
  2b:*	83 3f 01             	cmpl   $0x1,(%rdi)		<-- trapping instruction
  2e:	75 f9                	jne    0x29
  30:	f0 ff 0f             	lock decl (%rdi)
  33:	75 f1                	jne    0x26
  35:	5d                   	pop    %rbp
  36:	c3                   	retq
  37:	66                   	data16
  38:	66                   	data16
  39:	2e                   	cs
  3a:	0f                   	.byte 0xf
  3b:	1f                   	(bad)
  3c:	84 00                	test   %al,(%rax)
  3e:	00 00                	add    %al,(%rax)
	...

Code starting with the faulting instruction
===========================================
   0:	83 3f 01             	cmpl   $0x1,(%rdi)
   3:	75 f9                	jne    0xfffffffffffffffe
   5:	f0 ff 0f             	lock decl (%rdi)
   8:	75 f1                	jne    0xfffffffffffffffb
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66                   	data16
   d:	66                   	data16
   e:	2e                   	cs
   f:	0f                   	.byte 0xf
  10:	1f                   	(bad)
  11:	84 00                	test   %al,(%rax)
  13:	00 00                	add    %al,(%rax)
	...
[   49.730033] Kernel panic - not syncing: softlockup: hung tasks
[   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
[   49.730033]  ffff880628550000 ffff8800a6e03dd8 ffffffff8451770c 0000000000000001
[   49.730033]  ffffffff856ec784 ffff8800a6e03e58 ffffffff8450952f 0000000000003556
[   49.730033]  ffff880600000008 ffff8800a6e03e68 ffff8800a6e03e08 000000000000353e
[   49.730033] Call Trace:
[   49.730033] <IRQ> dump_stack (lib/dump_stack.c:52)
[   49.730033] panic (kernel/panic.c:119)
[   49.730033] watchdog_timer_fn (kernel/watchdog.c:372)
[   49.730033] __run_hrtimer (kernel/hrtimer.c:1268 (discriminator 2))
[   49.730033] ? watchdog (kernel/hung_task.c:191 kernel/hung_task.c:232)
[   49.730033] hrtimer_interrupt (kernel/hrtimer.c:1915)
[   49.730033] local_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:921)
[   49.730033] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[   49.730033] smp_apic_timer_interrupt (./arch/x86/include/asm/apic.h:696 arch/x86/kernel/apic/apic.c:945)
[   49.730033] apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[   49.730033] <EOI> ? retint_restore_args (arch/x86/kernel/entry_64.S:829)
[   49.730033] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[   49.730033] ? __write_lock_failed (arch/x86/lib/rwlock.S:20)
[   49.730033] do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[   49.730033] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[   49.730033] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   49.730033] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[   49.730033] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   49.730033] ? __const_udelay (arch/x86/lib/delay.c:126)
[   49.730033] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[   49.730033] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[   49.730033] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[   49.730033] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[   49.730033] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[   49.730033] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[   49.730033] ? dlm_init (fs/btrfs/super.c:1914)
[   49.730033] do_one_initcall (init/main.c:791)
[   49.730033] ? parse_args (kernel/params.c:120 kernel/params.c:205)
[   49.730033] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[   49.730033] ? loglevel (init/main.c:241)
[   49.730033] ? rest_init (init/main.c:932)
[   49.730033] kernel_init (init/main.c:937)
[   49.730033] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[   49.730033] ? rest_init (init/main.c:932)
[   49.730033] Dumping ftrace buffer:
[   49.730033]    (ftrace buffer empty)
[   49.730033] Kernel Offset: 0x0 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffff9fffffff)


Thanks,
Sasha

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-09 15:16 btrfs: hang on boot due to tests Sasha Levin
@ 2014-06-09 15:59 ` Chris Mason
  2014-06-09 16:17   ` Sasha Levin
  0 siblings, 1 reply; 7+ messages in thread
From: Chris Mason @ 2014-06-09 15:59 UTC (permalink / raw)
  To: Sasha Levin, jbacik; +Cc: LKML, Dave Jones, linux-btrfs

On 06/09/2014 11:16 AM, Sasha Levin wrote:
> Hi all,
> 
> It seems that some recent changes to btrfs tests make it hang during boot:
> 
> [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
> [   49.730033] Modules linked in:
> [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
> [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
> [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
> [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
> [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597


This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
tests were working for me.

-chris

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-09 15:59 ` Chris Mason
@ 2014-06-09 16:17   ` Sasha Levin
  2014-06-10 11:14     ` Ed Tomlinson
  0 siblings, 1 reply; 7+ messages in thread
From: Sasha Levin @ 2014-06-09 16:17 UTC (permalink / raw)
  To: Chris Mason, jbacik; +Cc: LKML, Dave Jones, linux-btrfs

On 06/09/2014 11:59 AM, Chris Mason wrote:
> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>> > Hi all,
>> > 
>> > It seems that some recent changes to btrfs tests make it hang during boot:
>> > 
>> > [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>> > [   49.730033] Modules linked in:
>> > [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>> > [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>> > [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>> > [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>> > [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
> 
> This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
> tests were working for me.

Yes, it's the latest -next tree available.

Also note that it doesn't happen every time, so might be some sort of a race?


Thanks,
Sasha

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-09 16:17   ` Sasha Levin
@ 2014-06-10 11:14     ` Ed Tomlinson
  2014-06-10 13:26       ` Chris Mason
  2014-06-11 23:14       ` Filipe David Manana
  0 siblings, 2 replies; 7+ messages in thread
From: Ed Tomlinson @ 2014-06-10 11:14 UTC (permalink / raw)
  To: Sasha Levin; +Cc: Chris Mason, jbacik, LKML, Dave Jones, linux-btrfs

On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
> On 06/09/2014 11:59 AM, Chris Mason wrote:
> > On 06/09/2014 11:16 AM, Sasha Levin wrote:
> >> > Hi all,
> >> > 
> >> > It seems that some recent changes to btrfs tests make it hang during boot:
> >> > 
> >> > [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
> >> > [   49.730033] Modules linked in:
> >> > [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
> >> > [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
> >> > [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
> >> > [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
> >> > [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
> > 
> > This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
> > tests were working for me.
> 
> Yes, it's the latest -next tree available.
> 
> Also note that it doesn't happen every time, so might be some sort of a race?

I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
I have not seen anything in logs.  Might this be related?

Thanks,

Ed Tomlinson

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-10 11:14     ` Ed Tomlinson
@ 2014-06-10 13:26       ` Chris Mason
  2014-06-12 16:02         ` Sasha Levin
  2014-06-11 23:14       ` Filipe David Manana
  1 sibling, 1 reply; 7+ messages in thread
From: Chris Mason @ 2014-06-10 13:26 UTC (permalink / raw)
  To: Ed Tomlinson, Sasha Levin; +Cc: jbacik, LKML, Dave Jones, linux-btrfs



On 06/10/2014 07:14 AM, Ed Tomlinson wrote:
> On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>> On 06/09/2014 11:59 AM, Chris Mason wrote:
>>> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>>>>> Hi all,
>>>>>
>>>>> It seems that some recent changes to btrfs tests make it hang during boot:
>>>>>
>>>>> [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>>>>> [   49.730033] Modules linked in:
>>>>> [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>>>>> [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>>>>> [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>>>>> [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>>>>> [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>>>
>>> This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
>>> tests were working for me.
>>
>> Yes, it's the latest -next tree available.
>>
>> Also note that it doesn't happen every time, so might be some sort of a race?
> 
> I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
> I have not seen anything in logs.  Might this be related?

It shouldn't be, the lockup Sasha hit is only in the self testing code,
and he's triggering it in the qgroups self tests.

Do you have CONFIG_BTRFS_FS_RUN_SANITY_TESTS=y?

I'd love a sysrq-t or sysrq-w while you're stuck.

-chris

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-10 11:14     ` Ed Tomlinson
  2014-06-10 13:26       ` Chris Mason
@ 2014-06-11 23:14       ` Filipe David Manana
  1 sibling, 0 replies; 7+ messages in thread
From: Filipe David Manana @ 2014-06-11 23:14 UTC (permalink / raw)
  To: Ed Tomlinson
  Cc: Sasha Levin, Chris Mason, Josef Bacik, LKML, Dave Jones, linux-btrfs

On Tue, Jun 10, 2014 at 12:14 PM, Ed Tomlinson <edt@aei.ca> wrote:
> On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>> On 06/09/2014 11:59 AM, Chris Mason wrote:
>> > On 06/09/2014 11:16 AM, Sasha Levin wrote:
>> >> > Hi all,
>> >> >
>> >> > It seems that some recent changes to btrfs tests make it hang during boot:
>> >> >
>> >> > [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>> >> > [   49.730033] Modules linked in:
>> >> > [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>> >> > [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>> >> > [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>> >> > [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>> >> > [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>> >
>> > This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
>> > tests were working for me.
>>
>> Yes, it's the latest -next tree available.
>>
>> Also note that it doesn't happen every time, so might be some sort of a race?
>
> I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
> I have not seen anything in logs.  Might this be related?

Hi Ed,

I think I ran into this too.
This patch should help you too:  https://patchwork.kernel.org/patch/4338641/

thanks

>
> Thanks,
>
> Ed Tomlinson
> --
> To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html



-- 
Filipe David Manana,

"Reasonable men adapt themselves to the world.
 Unreasonable men adapt the world to themselves.
 That's why all progress depends on unreasonable men."

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: btrfs: hang on boot due to tests
  2014-06-10 13:26       ` Chris Mason
@ 2014-06-12 16:02         ` Sasha Levin
  0 siblings, 0 replies; 7+ messages in thread
From: Sasha Levin @ 2014-06-12 16:02 UTC (permalink / raw)
  To: Chris Mason, Ed Tomlinson; +Cc: jbacik, LKML, Dave Jones, linux-btrfs

On 06/10/2014 09:26 AM, Chris Mason wrote:
> On 06/10/2014 07:14 AM, Ed Tomlinson wrote:
>> > On Monday 09 June 2014 12:17:50 Sasha Levin wrote:
>>> >> On 06/09/2014 11:59 AM, Chris Mason wrote:
>>>> >>> On 06/09/2014 11:16 AM, Sasha Levin wrote:
>>>>>> >>>>> Hi all,
>>>>>> >>>>>
>>>>>> >>>>> It seems that some recent changes to btrfs tests make it hang during boot:
>>>>>> >>>>>
>>>>>> >>>>> [   49.730033] NMI watchdog: BUG: soft lockup - CPU#34 stuck for 23s! [swapper/0:1]
>>>>>> >>>>> [   49.730033] Modules linked in:
>>>>>> >>>>> [   49.730033] hardirqs last enabled at (6389143): restore_args (arch/x86/kernel/entry_64.S:829)
>>>>>> >>>>> [   49.730033] hardirqs last disabled at (6389144): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
>>>>>> >>>>> [   49.730033] softirqs last enabled at (6389142): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
>>>>>> >>>>> [   49.730033] softirqs last disabled at (6389139): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
>>>>>> >>>>> [   49.730033] CPU: 34 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc8-next-20140606-sasha-00021-ga9d3a0b-dirty #597
>>>> >>>
>>>> >>> This is 3.15-rc8 + linux-next?  I'll try to reproduce here, but the
>>>> >>> tests were working for me.
>>> >>
>>> >> Yes, it's the latest -next tree available.
>>> >>
>>> >> Also note that it doesn't happen every time, so might be some sort of a race?
>> > 
>> > I've noticed that with -rc8 and now .15 btrfs fails to automount (or mount) about 1 in 2 times requiring a reboot to get it to work.
>> > I have not seen anything in logs.  Might this be related?
> It shouldn't be, the lockup Sasha hit is only in the self testing code,
> and he's triggering it in the qgroups self tests.
> 
> Do you have CONFIG_BTRFS_FS_RUN_SANITY_TESTS=y?

Yup.

> I'd love a sysrq-t or sysrq-w while you're stuck.

It's not a sysrq, but I've enabled softlockup_all_cpu_backtrace and got this:

[   60.233443] NMI watchdog: BUG: soft lockup - CPU#10 stuck for 23s! [swapper/0:1]
[   60.233443] Modules linked in:
[   60.233443] irq event stamp: 7251604
[   60.233443] hardirqs last enabled at (7251603): restore_args (arch/x86/kernel/entry_64.S:829)
[   60.233443] hardirqs last disabled at (7251604): apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[   60.233443] softirqs last enabled at (7251602): __do_softirq (./arch/x86/include/asm/preempt.h:22 kernel/softirq.c:296)
[   60.233443] softirqs last disabled at (7251597): irq_exit (kernel/softirq.c:346 kernel/softirq.c:387)
[   60.233443] CPU: 10 PID: 1 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.233443] task: ffff8803d68c8000 ti: ffff880036220000 task.ti: ffff880036220000
[   60.233443] RIP: queue_write_lock_slowpath (./arch/x86/include/asm/processor.h:691 ./arch/x86/include/asm/processor.h:696 kernel/locking/qrwlock.c:128)
[   60.233443] RSP: 0000:ffff8800362239f0  EFLAGS: 00000206
[   60.233443] RAX: 0000000000000101 RBX: ffffffff90560c3b RCX: 00000000000000ff
[   60.233443] RDX: ffff88017c1680b8 RSI: 0000000000000101 RDI: ffff88017c1680bc
[   60.233443] RBP: ffff880036223a08 R08: 000000000000eb46 R09: ffffffff8d95b478
[   60.233443] R10: 0000000000000001 R11: 0000000000000000 R12: ffff880036223968
[   60.233443] R13: 0000000000000001 R14: ffff880036220000 R15: ffff8803d68c8000
[   60.233443] FS:  0000000000000000(0000) GS:ffff880292e00000(0000) knlGS:0000000000000000
[   60.233443] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.233443] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.233443] Stack:
[   60.233443]  ffffffff8d1d1cc7 ffff880036223a68 ffff88017c1680b8 ffff880036223a38
[   60.233443]  ffffffff9055edf0 ffffffff8d95b93c ffffffff8db2d845 ffff88017c168000
[   60.233443]  ffff88017c168100 ffff880036223aa8 ffffffff8d95b93c ffff880036223a58
[   60.233443] Call Trace:
[   60.233443] ? do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[   60.233443] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[   60.233443] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   60.233443] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[   60.233443] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   60.233443] ? __const_udelay (arch/x86/lib/delay.c:126)
[   60.233443] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[   60.233443] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[   60.233443] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[   60.233443] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[   60.233443] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[   60.233443] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] do_one_initcall (init/main.c:791)
[   60.233443] ? parse_args (kernel/params.c:101 kernel/params.c:205)
[   60.233443] ? rmi_driver_init (drivers/hid/hid-saitek.c:197)
[   60.233443] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[   60.233443] ? loglevel (init/main.c:241)
[   60.233443] ? rest_init (init/main.c:932)
[   60.233443] kernel_init (init/main.c:937)
[   60.233443] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[   60.233443] ? rest_init (init/main.c:932)
[ 60.233443] Code: 89 ce 89 c8 83 ce 01 f0 0f b1 32 39 c1 74 0b f3 90 eb e7 0f 1f 80 00 00 00 00 b9 ff 00 00 00 0f 1f 00 8b 02 83 f8 01 74 09 f3 90 <eb> f5 0f 1f 44 00 00 f0 0f b1 0a 83 f8 01 75 ee e9 1a 00 00 00
All code
========
   0:	89 ce                	mov    %ecx,%esi
   2:	89 c8                	mov    %ecx,%eax
   4:	83 ce 01             	or     $0x1,%esi
   7:	f0 0f b1 32          	lock cmpxchg %esi,(%rdx)
   b:	39 c1                	cmp    %eax,%ecx
   d:	74 0b                	je     0x1a
   f:	f3 90                	pause
  11:	eb e7                	jmp    0xfffffffffffffffa
  13:	0f 1f 80 00 00 00 00 	nopl   0x0(%rax)
  1a:	b9 ff 00 00 00       	mov    $0xff,%ecx
  1f:	0f 1f 00             	nopl   (%rax)
  22:	8b 02                	mov    (%rdx),%eax
  24:	83 f8 01             	cmp    $0x1,%eax
  27:	74 09                	je     0x32
  29:	f3 90                	pause
  2b:*	eb f5                	jmp    0x22		<-- trapping instruction
  2d:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  32:	f0 0f b1 0a          	lock cmpxchg %ecx,(%rdx)
  36:	83 f8 01             	cmp    $0x1,%eax
  39:	75 ee                	jne    0x29
  3b:	e9 1a 00 00 00       	jmpq   0x5a
	...

Code starting with the faulting instruction
===========================================
   0:	eb f5                	jmp    0xfffffffffffffff7
   2:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
   7:	f0 0f b1 0a          	lock cmpxchg %ecx,(%rdx)
   b:	83 f8 01             	cmp    $0x1,%eax
   e:	75 ee                	jne    0xfffffffffffffffe
  10:	e9 1a 00 00 00       	jmpq   0x2f
	...
[   60.233443] sending NMI to other CPUs:
[   60.272505] NMI backtrace for cpu 0
[   60.272505] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.272505] task: ffffffff920354c0 ti: ffffffff92000000 task.ti: ffffffff92000000
[   60.272505] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.272505] RSP: 0000:ffffffff92003e38  EFLAGS: 00000282
[   60.272505] RAX: ffffffff920354c0 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.272505] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.272505] RBP: ffffffff92003e38 R08: 0000000000000000 R09: 0000000000000000
[   60.272505] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.272505] R13: 00000000ffffffed R14: ffffffff92000000 R15: 00000000000146e0
[   60.272505] FS:  0000000000000000(0000) GS:ffff880036e00000(0000) knlGS:0000000000000000
[   60.272505] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.272505] CR2: 0000000000000000 CR3: 000000001202e000 CR4: 00000000000006b0
[   60.272505] Stack:
[   60.272505]  ffffffff92003e58 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.272505]  ffffffff92003e68 ffffffff8d07e59f ffffffff92003ee8 ffffffff8d1bc7d9
[   60.272505]  0000000000000000 8dae92129a185908 ffffffff92003fd8 0000000000000002
[   60.272505] Call Trace:
[   60.272505] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.272505] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.272505] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.272505] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.272505] cpu_startup_entry (??:?)
[   60.272505] rest_init (init/main.c:419)
[   60.272505] ? rest_init (init/main.c:394)
[   60.272505] start_kernel (init/main.c:681)
[   60.272505] ? set_init_arg (init/main.c:281)
[   60.272505] ? early_idt_handlers (arch/x86/kernel/head_64.S:340)
[   60.272505] x86_64_start_reservations (arch/x86/kernel/head64.c:194)
[   60.272505] x86_64_start_kernel (arch/x86/kernel/head64.c:183)
[ 60.272505] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268631] NMI backtrace for cpu 3
[   60.307779] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 34.316 msecs
[   60.268631] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.268631] task: ffff8800a6590000 ti: ffff880035e1c000 task.ti: ffff880035e1c000
[   60.268631] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.268631] RSP: 0000:ffff880035e1fe28  EFLAGS: 00000282
[   60.268631] RAX: ffff8800a6590000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.268631] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.268631] RBP: ffff880035e1fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.268631] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.268631] R13: 00000000ffffffed R14: ffff880035e1c000 R15: 0000000000000000
[   60.268631] FS:  0000000000000000(0000) GS:ffff88010ce00000(0000) knlGS:0000000000000000
[   60.268631] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.268631] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.268631] Stack:
[   60.268631]  ffff880035e1fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.268631]  ffff880035e1fe58 ffffffff8d07e59f ffff880035e1fed8 ffffffff8d1bc7d9
[   60.268631]  0000000000000000 ca4cdd68daa1d2ae ffff880035e1ffd8 000000000000f000
[   60.268631] Call Trace:
[   60.268631] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.268631] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.268631] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.268631] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.268631] cpu_startup_entry (??:?)
[   60.268631] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268631] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268642] NMI backtrace for cpu 17
[   60.359741] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 86.152 msecs
[   60.268642] CPU: 17 PID: 0 Comm: swapper/17 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.268642] task: ffff8801b45a8000 ti: ffff880035e68000 task.ti: ffff880035e68000
[   60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.268642] RSP: 0000:ffff880035e6be28  EFLAGS: 00000282
[   60.268642] RAX: ffff8801b45a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.268642] RBP: ffff880035e6be28 R08: 0000000000000000 R09: 0000000000000000
[   60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.268642] R13: 00000000ffffffed R14: ffff880035e68000 R15: 0000000000000000
[   60.268642] FS:  0000000000000000(0000) GS:ffff88040ce00000(0000) knlGS:0000000000000000
[   60.268642] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.268642] Stack:
[   60.268642]  ffff880035e6be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.268642]  ffff880035e6be58 ffffffff8d07e59f ffff880035e6bed8 ffffffff8d1bc7d9
[   60.268642]  0000000000000000 ea943b0e542482c0 ffff880035e6bfd8 000000000000f000
[   60.268642] Call Trace:
[   60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.268642] cpu_startup_entry (??:?)
[   60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268642] NMI backtrace for cpu 14
[   60.403409] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 129.784 msecs
[   60.268642] CPU: 14 PID: 0 Comm: swapper/14 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.268642] task: ffff88036a5b0000 ti: ffff880035e58000 task.ti: ffff880035e58000
[   60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.268642] RSP: 0000:ffff880035e5be28  EFLAGS: 00000282
[   60.268642] RAX: ffff88036a5b0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.268642] RBP: ffff880035e5be28 R08: 0000000000000000 R09: 0000000000000000
[   60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.268642] R13: 00000000ffffffed R14: ffff880035e58000 R15: 0000000000000000
[   60.268642] FS:  0000000000000000(0000) GS:ffff88036ae00000(0000) knlGS:0000000000000000
[   60.268642] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.268642] Stack:
[   60.268642]  ffff880035e5be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.268642]  ffff880035e5be58 ffffffff8d07e59f ffff880035e5bed8 ffffffff8d1bc7d9
[   60.268642]  0000000000000000 99bf70d8d7246944 ffff880035e5bfd8 000000000000f000
[   60.268642] Call Trace:
[   60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.268642] cpu_startup_entry (??:?)
[   60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268642] NMI backtrace for cpu 7
[   60.436531] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 162.898 msecs
[   60.268642] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.268642] task: ffff8802925a8000 ti: ffff880035e30000 task.ti: ffff880035e30000
[   60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.268642] RSP: 0000:ffff880035e33e28  EFLAGS: 00000282
[   60.268642] RAX: ffff8802925a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.268642] RBP: ffff880035e33e28 R08: 0000000000000000 R09: 0000000000000000
[   60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.268642] R13: 00000000ffffffed R14: ffff880035e30000 R15: 0000000000000000
[   60.268642] FS:  0000000000000000(0000) GS:ffff8801ece00000(0000) knlGS:0000000000000000
[   60.268642] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.268642] Stack:
[   60.268642]  ffff880035e33e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.268642]  ffff880035e33e58 ffffffff8d07e59f ffff880035e33ed8 ffffffff8d1bc7d9
[   60.268642]  0000000000000000 39ab99d7099f72a0 ffff880035e33fd8 000000000000f000
[   60.268642] Call Trace:
[   60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.268642] cpu_startup_entry (??:?)
[   60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268642] NMI backtrace for cpu 23
[   60.472952] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 199.295 msecs
[   60.268642] CPU: 23 PID: 0 Comm: swapper/23 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.268642] task: ffff88025c5c0000 ti: ffff880035e80000 task.ti: ffff880035e80000
[   60.268642] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.268642] RSP: 0000:ffff880035e83e28  EFLAGS: 00000282
[   60.268642] RAX: ffff88025c5c0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.268642] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.268642] RBP: ffff880035e83e28 R08: 0000000000000000 R09: 0000000000000000
[   60.268642] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.268642] R13: 00000000ffffffed R14: ffff880035e80000 R15: 0000000000000000
[   60.268642] FS:  0000000000000000(0000) GS:ffff880550e00000(0000) knlGS:0000000000000000
[   60.268642] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.268642] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.268642] Stack:
[   60.268642]  ffff880035e83e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.268642]  ffff880035e83e58 ffffffff8d07e59f ffff880035e83ed8 ffffffff8d1bc7d9
[   60.268642]  0000000000000000 273c2f151685900e ffff880035e83fd8 000000000000f000
[   60.268642] Call Trace:
[   60.268642] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.268642] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.268642] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.268642] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.268642] cpu_startup_entry (??:?)
[   60.268642] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.268642] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.269373] NMI backtrace for cpu 1
[   60.502478] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 228.823 msecs
[   60.269373] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.269373] task: ffff880550588000 ti: ffff880035e10000 task.ti: ffff880035e10000
[   60.269373] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.269373] RSP: 0000:ffff880035e13e28  EFLAGS: 00000282
[   60.269373] RAX: ffff880550588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.269373] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.269373] RBP: ffff880035e13e28 R08: 0000000000000000 R09: 0000000000000000
[   60.269373] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.269373] R13: 00000000ffffffed R14: ffff880035e10000 R15: 0000000000000000
[   60.269373] FS:  0000000000000000(0000) GS:ffff88006ee00000(0000) knlGS:0000000000000000
[   60.269373] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.269373] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.269373] Stack:
[   60.269373]  ffff880035e13e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.269373]  ffff880035e13e58 ffffffff8d07e59f ffff880035e13ed8 ffffffff8d1bc7d9
[   60.269373]  0000000000000000 b57caad4e27916fc ffff880035e13fd8 000000000000f000
[   60.269373] Call Trace:
[   60.269373] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.269373] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.269373] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.269373] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.269373] cpu_startup_entry (??:?)
[   60.269373] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.269373] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.268642] NMI backtrace for cpu 18
[   60.535232] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 261.527 msecs
[   60.535725] CPU: 18 PID: 0 Comm: swapper/18 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.535725] task: ffff8802fe920000 ti: ffff880035e6c000 task.ti: ffff880035e6c000
[   60.535725] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.535725] RSP: 0000:ffff880035e6fe28  EFLAGS: 00000282
[   60.535725] RAX: ffff8802fe920000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.535725] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.535725] RBP: ffff880035e6fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.535725] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.535725] R13: 00000000ffffffed R14: ffff880035e6c000 R15: 0000000000000000
[   60.535725] FS:  0000000000000000(0000) GS:ffff880442e00000(0000) knlGS:0000000000000000
[   60.535725] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.535725] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.535725] Stack:
[   60.535725]  ffff880035e6fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.535725]  ffff880035e6fe58 ffffffff8d07e59f ffff880035e6fed8 ffffffff8d1bc7d9
[   60.535725]  0000000000000000 3f9d843d2cfb1974 ffff880035e6ffd8 000000000000f000
[   60.535725] Call Trace:
[   60.535725] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.535725] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.535725] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.535725] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.535725] cpu_startup_entry (??:?)
[   60.535725] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.535725] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.535673] NMI backtrace for cpu 11
[   60.566960] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 293.259 msecs
[   60.567405] CPU: 11 PID: 0 Comm: swapper/11 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.567405] task: ffff880442588000 ti: ffff880035e44000 task.ti: ffff880035e44000
[   60.567405] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.567405] RSP: 0000:ffff880035e47e28  EFLAGS: 00000282
[   60.567405] RAX: ffff880442588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.567405] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.567405] RBP: ffff880035e47e28 R08: 0000000000000000 R09: 0000000000000000
[   60.567405] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.567405] R13: 00000000ffffffed R14: ffff880035e44000 R15: 0000000000000000
[   60.567405] FS:  0000000000000000(0000) GS:ffff8802c8e00000(0000) knlGS:0000000000000000
[   60.567405] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.567405] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.567405] Stack:
[   60.567405]  ffff880035e47e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.567405]  ffff880035e47e58 ffffffff8d07e59f ffff880035e47ed8 ffffffff8d1bc7d9
[   60.567405]  0000000000000000 474f47db85fac2c5 ffff880035e47fd8 000000000000f000
[   60.567405] Call Trace:
[   60.567405] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.567405] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.567405] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.567405] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.567405] cpu_startup_entry (??:?)
[   60.567405] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.567405] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.567405] NMI backtrace for cpu 21
[   60.594485] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 320.725 msecs
[   60.594943] CPU: 21 PID: 0 Comm: swapper/21 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.594943] task: ffff880694990000 ti: ffff880035e78000 task.ti: ffff880035e78000
[   60.594943] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.594943] RSP: 0000:ffff880035e7be28  EFLAGS: 00000282
[   60.594943] RAX: ffff880694990000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.594943] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.594943] RBP: ffff880035e7be28 R08: 0000000000000000 R09: 0000000000000000
[   60.594943] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.594943] R13: 00000000ffffffed R14: ffff880035e78000 R15: 0000000000000000
[   60.594943] FS:  0000000000000000(0000) GS:ffff8804e4e00000(0000) knlGS:0000000000000000
[   60.594943] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.594943] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.594943] Stack:
[   60.594943]  ffff880035e7be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.594943]  ffff880035e7be58 ffffffff8d07e59f ffff880035e7bed8 ffffffff8d1bc7d9
[   60.594943]  0000000000000000 3fe10556820a9b9b ffff880035e7bfd8 000000000000f000
[   60.594943] Call Trace:
[   60.594943] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.594943] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.594943] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.594943] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.594943] cpu_startup_entry (??:?)
[   60.594943] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.594943] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.594943] NMI backtrace for cpu 4
[   60.626228] INFO: NMI handler (arch_trigger_all_cpu_backtrace_handler) took too long to run: 352.459 msecs
[   60.626914] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.626914] task: ffff8801b4588000 ti: ffff880035e20000 task.ti: ffff880035e20000
[   60.626914] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.626914] RSP: 0000:ffff880035e23e28  EFLAGS: 00000282
[   60.626914] RAX: ffff8801b4588000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.626914] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.626914] RBP: ffff880035e23e28 R08: 0000000000000000 R09: 0000000000000000
[   60.626914] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.626914] R13: 00000000ffffffed R14: ffff880035e20000 R15: 0000000000000000
[   60.626914] FS:  0000000000000000(0000) GS:ffff880144e00000(0000) knlGS:0000000000000000
[   60.626914] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.626914] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.626914] Stack:
[   60.626914]  ffff880035e23e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.626914]  ffff880035e23e58 ffffffff8d07e59f ffff880035e23ed8 ffffffff8d1bc7d9
[   60.626914]  0000000000000000 7e2449b239d10efa ffff880035e23fd8 000000000000f000
[   60.626914] Call Trace:
[   60.626914] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.626914] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.626914] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.626914] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.626914] cpu_startup_entry (??:?)
[   60.626914] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.626914] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.626914] NMI backtrace for cpu 15
[   60.656449] CPU: 15 PID: 0 Comm: swapper/15 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.656449] task: ffff88051a5b0000 ti: ffff880035e5c000 task.ti: ffff880035e5c000
[   60.656449] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.656449] RSP: 0000:ffff880035e5fe28  EFLAGS: 00000282
[   60.656449] RAX: ffff88051a5b0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.656449] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.656449] RBP: ffff880035e5fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.656449] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.656449] R13: 00000000ffffffed R14: ffff880035e5c000 R15: 0000000000000000
[   60.656449] FS:  0000000000000000(0000) GS:ffff8803a0e00000(0000) knlGS:0000000000000000
[   60.656449] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.656449] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.656449] Stack:
[   60.656449]  ffff880035e5fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.656449]  ffff880035e5fe58 ffffffff8d07e59f ffff880035e5fed8 ffffffff8d1bc7d9
[   60.656449]  0000000000000000 b64a2bfca327b7ec ffff880035e5ffd8 000000000000f000
[   60.656449] Call Trace:
[   60.656449] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.656449] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.656449] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.656449] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.656449] cpu_startup_entry (??:?)
[   60.656449] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.656449] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.656449] NMI backtrace for cpu 22
[   60.656449] CPU: 22 PID: 0 Comm: swapper/22 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.688896] task: ffff88010c580000 ti: ffff880035e7c000 task.ti: ffff880035e7c000
[   60.688896] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.688896] RSP: 0000:ffff880035e7fe28  EFLAGS: 00000282
[   60.688896] RAX: ffff88010c580000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.688896] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.688896] RBP: ffff880035e7fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.688896] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.688896] R13: 00000000ffffffed R14: ffff880035e7c000 R15: 0000000000000000
[   60.688896] FS:  0000000000000000(0000) GS:ffff88051ae00000(0000) knlGS:0000000000000000
[   60.688896] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.688896] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.688896] Stack:
[   60.688896]  ffff880035e7fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.688896]  ffff880035e7fe58 ffffffff8d07e59f ffff880035e7fed8 ffffffff8d1bc7d9
[   60.688896]  0000000000000000 31cf8a3f823c253f ffff880035e7ffd8 000000000000f000
[   60.688896] Call Trace:
[   60.688896] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.688896] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.688896] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.688896] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.688896] cpu_startup_entry (??:?)
[   60.688896] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.688896] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.688896] NMI backtrace for cpu 5
[   60.688896] CPU: 5 PID: 0 Comm: swapper/5 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.720000] task: ffff88036a598000 ti: ffff880035e24000 task.ti: ffff880035e24000
[   60.720000] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.720000] RSP: 0000:ffff880035e27e28  EFLAGS: 00000282
[   60.720000] RAX: ffff88036a598000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.720000] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.720000] RBP: ffff880035e27e28 R08: 0000000000000000 R09: 0000000000000000
[   60.720000] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.720000] R13: 00000000ffffffed R14: ffff880035e24000 R15: 0000000000000000
[   60.720000] FS:  0000000000000000(0000) GS:ffff88017ce00000(0000) knlGS:0000000000000000
[   60.720000] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.720000] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.720000] Stack:
[   60.720000]  ffff880035e27e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.720000]  ffff880035e27e58 ffffffff8d07e59f ffff880035e27ed8 ffffffff8d1bc7d9
[   60.720000]  0000000000000000 cf5f6d6484a02f84 ffff880035e27fd8 000000000000f000
[   60.720000] Call Trace:
[   60.720000] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.720000] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.720000] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.720000] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.720000] cpu_startup_entry (??:?)
[   60.720000] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.720000] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.720000] NMI backtrace for cpu 20
[   60.747526] CPU: 20 PID: 0 Comm: swapper/20 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.747526] task: ffff880550590000 ti: ffff880035e74000 task.ti: ffff880035e74000
[   60.747526] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.747526] RSP: 0000:ffff880035e77e28  EFLAGS: 00000282
[   60.747526] RAX: ffff880550590000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.747526] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.747526] RBP: ffff880035e77e28 R08: 0000000000000000 R09: 0000000000000000
[   60.747526] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.747526] R13: 00000000ffffffed R14: ffff880035e74000 R15: 0000000000000000
[   60.747526] FS:  0000000000000000(0000) GS:ffff8804af000000(0000) knlGS:0000000000000000
[   60.747526] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.747526] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.747526] Stack:
[   60.747526]  ffff880035e77e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.747526]  ffff880035e77e58 ffffffff8d07e59f ffff880035e77ed8 ffffffff8d1bc7d9
[   60.747526]  0000000000000000 bf85bc695f3528e6 ffff880035e77fd8 000000000000f000
[   60.747526] Call Trace:
[   60.747526] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.747526] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.747526] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.747526] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.747526] cpu_startup_entry (??:?)
[   60.747526] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.747526] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.747526] NMI backtrace for cpu 13
[   60.747526] CPU: 13 PID: 0 Comm: swapper/13 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.783369] task: ffff8801b45a0000 ti: ffff880035e4c000 task.ti: ffff880035e4c000
[   60.783369] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.783369] RSP: 0000:ffff880035e4fe28  EFLAGS: 00000282
[   60.783369] RAX: ffff8801b45a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.783369] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.783369] RBP: ffff880035e4fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.783369] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.783369] R13: 00000000ffffffed R14: ffff880035e4c000 R15: 0000000000000000
[   60.783369] FS:  0000000000000000(0000) GS:ffff880334e00000(0000) knlGS:0000000000000000
[   60.783369] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.783369] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.783369] Stack:
[   60.783369]  ffff880035e4fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.783369]  ffff880035e4fe58 ffffffff8d07e59f ffff880035e4fed8 ffffffff8d1bc7d9
[   60.783369]  0000000000000000 e2f60941915f5a68 ffff880035e4ffd8 000000000000f000
[   60.783369] Call Trace:
[   60.783369] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.783369] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.783369] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.783369] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.783369] cpu_startup_entry (??:?)
[   60.783369] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.783369] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.783369] NMI backtrace for cpu 9
[   60.783369] CPU: 9 PID: 0 Comm: swapper/9 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.783369] task: ffff8800a65a0000 ti: ffff880035e3c000 task.ti: ffff880035e3c000
[   60.783369] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.783369] RSP: 0000:ffff880035e3fe28  EFLAGS: 00000282
[   60.783369] RAX: ffff8800a65a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.783369] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.783369] RBP: ffff880035e3fe28 R08: 0000000000000000 R09: 0000000000000000
[   60.783369] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.783369] R13: 00000000ffffffed R14: ffff880035e3c000 R15: 0000000000000000
[   60.783369] FS:  0000000000000000(0000) GS:ffff88025ce00000(0000) knlGS:0000000000000000
[   60.783369] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.783369] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.783369] Stack:
[   60.783369]  ffff880035e3fe48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.783369]  ffff880035e3fe58 ffffffff8d07e59f ffff880035e3fed8 ffffffff8d1bc7d9
[   60.783369]  0000000000000000 127cf1a0cc1cba84 ffff880035e3ffd8 000000000000f000
[   60.783369] Call Trace:
[   60.783369] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.783369] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.783369] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.783369] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.783369] cpu_startup_entry (??:?)
[   60.783369] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.783369] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.783369] NMI backtrace for cpu 8
[   60.783369] CPU: 8 PID: 0 Comm: swapper/8 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.857533] task: ffff88051a5a0000 ti: ffff880035e34000 task.ti: ffff880035e34000
[   60.857533] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.857533] RSP: 0000:ffff880035e37e28  EFLAGS: 00000282
[   60.857533] RAX: ffff88051a5a0000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.857533] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.857533] RBP: ffff880035e37e28 R08: 0000000000000000 R09: 0000000000000000
[   60.857533] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.857533] R13: 00000000ffffffed R14: ffff880035e34000 R15: 0000000000000000
[   60.857533] FS:  0000000000000000(0000) GS:ffff880224e00000(0000) knlGS:0000000000000000
[   60.857533] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.857533] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.857533] Stack:
[   60.857533]  ffff880035e37e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.857533]  ffff880035e37e58 ffffffff8d07e59f ffff880035e37ed8 ffffffff8d1bc7d9
[   60.857533]  0000000000000000 eb8449bb992ae2a3 ffff880035e37fd8 000000000000f000
[   60.857533] Call Trace:
[   60.857533] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.857533] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.857533] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.857533] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.857533] cpu_startup_entry (??:?)
[   60.857533] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.857533] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.857533] NMI backtrace for cpu 19
[   60.857533] CPU: 19 PID: 0 Comm: swapper/19 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.895459] task: ffff880442598000 ti: ffff880035e70000 task.ti: ffff880035e70000
[   60.895459] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.895459] RSP: 0000:ffff880035e73e28  EFLAGS: 00000282
[   60.895459] RAX: ffff880442598000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.895459] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.895459] RBP: ffff880035e73e28 R08: 0000000000000000 R09: 0000000000000000
[   60.895459] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.895459] R13: 00000000ffffffed R14: ffff880035e70000 R15: 0000000000000000
[   60.895459] FS:  0000000000000000(0000) GS:ffff880478e00000(0000) knlGS:0000000000000000
[   60.895459] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.895459] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.895459] Stack:
[   60.895459]  ffff880035e73e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.895459]  ffff880035e73e58 ffffffff8d07e59f ffff880035e73ed8 ffffffff8d1bc7d9
[   60.895459]  0000000000000000 5e9a969615b783f5 ffff880035e73fd8 000000000000f000
[   60.895459] Call Trace:
[   60.895459] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.895459] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.895459] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.895459] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.895459] cpu_startup_entry (??:?)
[   60.895459] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.895459] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.895459] NMI backtrace for cpu 16
[   60.895459] CPU: 16 PID: 0 Comm: swapper/16 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.928936] task: ffff8806ca9a8000 ti: ffff880035e60000 task.ti: ffff880035e60000
[   60.928936] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.928936] RSP: 0000:ffff880035e63e28  EFLAGS: 00000282
[   60.928936] RAX: ffff8806ca9a8000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.928936] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.928936] RBP: ffff880035e63e28 R08: 0000000000000000 R09: 0000000000000000
[   60.928936] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.928936] R13: 00000000ffffffed R14: ffff880035e60000 R15: 0000000000000000
[   60.928936] FS:  0000000000000000(0000) GS:ffff8803d7000000(0000) knlGS:0000000000000000
[   60.928936] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.928936] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.928936] Stack:
[   60.928936]  ffff880035e63e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.928936]  ffff880035e63e58 ffffffff8d07e59f ffff880035e63ed8 ffffffff8d1bc7d9
[   60.928936]  0000000000000000 eb01a73bc8ea8b3b ffff880035e63fd8 000000000000f000
[   60.928936] Call Trace:
[   60.928936] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.928936] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.928936] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.928936] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.928936] cpu_startup_entry (??:?)
[   60.928936] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.928936] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.928901] NMI backtrace for cpu 2
[   60.928901] CPU: 2 PID: 0 Comm: swapper/2 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.957846] task: ffff880694988000 ti: ffff880035e14000 task.ti: ffff880035e14000
[   60.957846] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.957846] RSP: 0000:ffff880035e17e28  EFLAGS: 00000282
[   60.957846] RAX: ffff880694988000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.957846] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.957846] RBP: ffff880035e17e28 R08: 0000000000000000 R09: 0000000000000000
[   60.957846] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.957846] R13: 00000000ffffffed R14: ffff880035e14000 R15: 0000000000000000
[   60.957846] FS:  0000000000000000(0000) GS:ffff8800a6e00000(0000) knlGS:0000000000000000
[   60.957846] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.957846] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.957846] Stack:
[   60.957846]  ffff880035e17e48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.957846]  ffff880035e17e58 ffffffff8d07e59f ffff880035e17ed8 ffffffff8d1bc7d9
[   60.957846]  0000000000000000 e58d5ef30e9dc64f ffff880035e17fd8 000000000000f000
[   60.957846] Call Trace:
[   60.957846] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.957846] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.957846] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.957846] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.957846] cpu_startup_entry (??:?)
[   60.957846] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.957846] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.957846] NMI backtrace for cpu 12
[   60.957846] CPU: 12 PID: 0 Comm: swapper/12 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.998842] task: ffff88065e920000 ti: ffff880035e48000 task.ti: ffff880035e48000
[   60.998842] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   60.998842] RSP: 0000:ffff880035e4be28  EFLAGS: 00000282
[   60.998842] RAX: ffff88065e920000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   60.998842] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   60.998842] RBP: ffff880035e4be28 R08: 0000000000000000 R09: 0000000000000000
[   60.998842] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   60.998842] R13: 00000000ffffffed R14: ffff880035e48000 R15: 0000000000000000
[   60.998842] FS:  0000000000000000(0000) GS:ffff8802ff000000(0000) knlGS:0000000000000000
[   60.998842] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   60.998842] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   60.998842] Stack:
[   60.998842]  ffff880035e4be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   60.998842]  ffff880035e4be58 ffffffff8d07e59f ffff880035e4bed8 ffffffff8d1bc7d9
[   60.998842]  0000000000000000 9df861323f902cb6 ffff880035e4bfd8 000000000000f000
[   60.998842] Call Trace:
[   60.998842] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   60.998842] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   60.998842] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   60.998842] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   60.998842] cpu_startup_entry (??:?)
[   60.998842] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 60.998842] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.998842] NMI backtrace for cpu 6
[   60.998842] CPU: 6 PID: 0 Comm: swapper/6 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   61.027305] task: ffff88065e910000 ti: ffff880035e28000 task.ti: ffff880035e28000
[   61.027305] RIP: native_safe_halt (./arch/x86/include/asm/irqflags.h:50)
[   61.027305] RSP: 0000:ffff880035e2be28  EFLAGS: 00000282
[   61.027305] RAX: ffff88065e910000 RBX: ffffffff932c9540 RCX: 0000000000000000
[   61.027305] RDX: 0000000000000000 RSI: ffffffff91853194 RDI: ffffffff917eb45d
[   61.027305] RBP: ffff880035e2be28 R08: 0000000000000000 R09: 0000000000000000
[   61.027305] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[   61.027305] R13: 00000000ffffffed R14: ffff880035e28000 R15: 0000000000000000
[   61.027305] FS:  0000000000000000(0000) GS:ffff8801b4e00000(0000) knlGS:0000000000000000
[   61.027305] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   61.027305] CR2: 00000000ffffffff CR3: 000000001202e000 CR4: 00000000000006a0
[   61.027305] Stack:
[   61.027305]  ffff880035e2be48 ffffffff8d07d88d ffffffff932c9540 0000000000000000
[   61.027305]  ffff880035e2be58 ffffffff8d07e59f ffff880035e2bed8 ffffffff8d1bc7d9
[   61.027305]  0000000000000000 e4346704a8838ce9 ffff880035e2bfd8 000000000000f000
[   61.027305] Call Trace:
[   61.027305] default_idle (./arch/x86/include/asm/paravirt.h:111 arch/x86/kernel/process.c:310)
[   61.027305] arch_cpu_idle (arch/x86/kernel/process.c:302)
[   61.027305] cpu_idle_loop (kernel/sched/idle.c:120 kernel/sched/idle.c:224)
[   61.027305] ? cpu_startup_entry (./arch/x86/include/asm/msr.h:117 ./arch/x86/include/asm/stackprotector.h:73 kernel/sched/idle.c:269)
[   61.027305] cpu_startup_entry (??:?)
[   61.027305] start_secondary (arch/x86/kernel/smpboot.c:274)
[ 61.027305] Code: 00 00 00 00 00 55 48 89 e5 fa 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb 5d c3 66 0f 1f 84 00 00 00 00 00 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 66 0f 1f 84
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	00 55 48             	add    %dl,0x48(%rbp)
   7:	89 e5                	mov    %esp,%ebp
   9:	fa                   	cli
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  13:	00 00
  15:	55                   	push   %rbp
  16:	48 89 e5             	mov    %rsp,%rbp
  19:	fb                   	sti
  1a:	5d                   	pop    %rbp
  1b:	c3                   	retq
  1c:	66 0f 1f 84 00 00 00 	nopw   0x0(%rax,%rax,1)
  23:	00 00
  25:	55                   	push   %rbp
  26:	48 89 e5             	mov    %rsp,%rbp
  29:	fb                   	sti
  2a:	f4                   	hlt
  2b:*	5d                   	pop    %rbp		<-- trapping instruction
  2c:	c3                   	retq
  2d:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
  34:	00
  35:	55                   	push   %rbp
  36:	48 89 e5             	mov    %rsp,%rbp
  39:	f4                   	hlt
  3a:	5d                   	pop    %rbp
  3b:	c3                   	retq
  3c:	66                   	data16
  3d:	0f                   	.byte 0xf
  3e:	1f                   	(bad)
  3f:	84 00                	test   %al,(%rax)

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	c3                   	retq
   2:	0f 1f 84 00 00 00 00 	nopl   0x0(%rax,%rax,1)
   9:	00
   a:	55                   	push   %rbp
   b:	48 89 e5             	mov    %rsp,%rbp
   e:	f4                   	hlt
   f:	5d                   	pop    %rbp
  10:	c3                   	retq
  11:	66                   	data16
  12:	0f                   	.byte 0xf
  13:	1f                   	(bad)
  14:	84 00                	test   %al,(%rax)
[   60.233443] Kernel panic - not syncing: softlockup: hung tasks
[   60.233443] CPU: 10 PID: 1 Comm: swapper/0 Not tainted 3.15.0-next-20140612-sasha-00022-g5e4db85-dirty #645
[   60.233443]  ffff8803d68c8000 ffff880292e03dd8 ffffffff90512768 0000000000000001
[   60.233443]  ffffffff916fa8f7 ffff880292e03e58 ffffffff9050433f ffff880292e03e18
[   60.233443]  ffffffff00000008 ffff880292e03e68 ffff880292e03e08 000000000000001a
[   60.233443] Call Trace:
[   60.233443] <IRQ> dump_stack (lib/dump_stack.c:52)
[   60.233443] panic (kernel/panic.c:119)
[   60.233443] watchdog_timer_fn (kernel/watchdog.c:372)
[   60.233443] __run_hrtimer (kernel/hrtimer.c:1268 (discriminator 2))
[   60.233443] ? watchdog (kernel/hung_task.c:191 kernel/hung_task.c:232)
[   60.233443] hrtimer_interrupt (kernel/hrtimer.c:1915)
[   60.233443] local_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:921)
[   60.233443] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[   60.233443] smp_apic_timer_interrupt (./arch/x86/include/asm/apic.h:696 arch/x86/kernel/apic/apic.c:945)
[   60.233443] apic_timer_interrupt (arch/x86/kernel/entry_64.S:1021)
[   60.233443] <EOI> ? retint_restore_args (arch/x86/kernel/entry_64.S:829)
[   60.233443] ? btrfs_tree_read_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:103)
[   60.233443] ? queue_write_lock_slowpath (./arch/x86/include/asm/processor.h:691 ./arch/x86/include/asm/processor.h:696 kernel/locking/qrwlock.c:128)
[   60.233443] ? do_raw_write_lock (kernel/locking/spinlock_debug.c:236 kernel/locking/spinlock_debug.c:280)
[   60.233443] _raw_write_lock (include/linux/rwlock_api_smp.h:211 kernel/locking/spinlock.c:295)
[   60.233443] ? btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   60.233443] ? delay_tsc (./arch/x86/include/asm/preempt.h:98 arch/x86/lib/delay.c:86)
[   60.233443] btrfs_tree_lock (./arch/x86/include/asm/atomic.h:27 fs/btrfs/locking.c:219)
[   60.233443] ? __const_udelay (arch/x86/lib/delay.c:126)
[   60.233443] ? __rcu_read_unlock (kernel/rcu/update.c:97)
[   60.233443] btrfs_lock_root_node (fs/btrfs/ctree.c:193)
[   60.233443] btrfs_search_slot (fs/btrfs/ctree.c:2768)
[   60.233443] btrfs_insert_empty_items (fs/btrfs/ctree.c:4836)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] insert_normal_tree_ref.constprop.4 (fs/btrfs/tests/qgroup-tests.c:60)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] test_no_shared_qgroup (fs/btrfs/tests/qgroup-tests.c:249)
[   60.233443] btrfs_test_qgroups (fs/btrfs/tests/qgroup-tests.c:462)
[   60.233443] init_btrfs_fs (fs/btrfs/super.c:1909 fs/btrfs/super.c:1969)
[   60.233443] ? dlm_init (fs/btrfs/super.c:1914)
[   60.233443] do_one_initcall (init/main.c:791)
[   60.233443] ? parse_args (kernel/params.c:101 kernel/params.c:205)
[   60.233443] ? rmi_driver_init (drivers/hid/hid-saitek.c:197)
[   60.233443] kernel_init_freeable (init/main.c:856 init/main.c:865 init/main.c:884 init/main.c:1005)
[   60.233443] ? loglevel (init/main.c:241)
[   60.233443] ? rest_init (init/main.c:932)
[   60.233443] kernel_init (init/main.c:937)
[   60.233443] ret_from_fork (arch/x86/kernel/entry_64.S:349)
[   60.233443] ? rest_init (init/main.c:932)
[   60.233443] Dumping ftrace buffer:
[   60.233443]    (ftrace buffer empty)
[   60.233443] Kernel Offset: 0xc000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   60.233443] Rebooting in 1 seconds..


Thanks,
Sasha

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2014-06-12 16:02 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-06-09 15:16 btrfs: hang on boot due to tests Sasha Levin
2014-06-09 15:59 ` Chris Mason
2014-06-09 16:17   ` Sasha Levin
2014-06-10 11:14     ` Ed Tomlinson
2014-06-10 13:26       ` Chris Mason
2014-06-12 16:02         ` Sasha Levin
2014-06-11 23:14       ` Filipe David Manana

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.