db> show turnstile 0xc000000019e5d240 Lock: 0xc00000002ad60108 - (rw) vm object Lock Owner: none Shared Waiters: 0xc000000053b73000 (tid 100761, pid 46029, "cc") KDB: stack backtrace of thread 100761: 0xe0000000b3785a70: at mi_switch+0x154 0xe0000000b3785ab0: at turnstile_wait+0x3f8 0xe0000000b3785b20: at __rw_rlock_int+0x434 0xe0000000b3785bf0: at __rw_rlock_int+0x98 0xe0000000b3785c20: at vm_map_try_merge_entries+0x380 0xe0000000b3785cd0: at vm_map_insert+0x508 0xe0000000b3785dd0: at vm_map_fixed+0x11c 0xe0000000b3785e40: at elf64_stackgap+0x3ecc 0xe0000000b3785ed0: at elf64_stackgap+0x3714 0xe0000000b3785fd0: at elf64_stackgap+0x2cf0 0xe0000000b3786180: at kern_execve+0x6b0 0xe0000000b37865e0: at sys_execve+0x7c 0xe0000000b3786680: at trap+0xe48 0xe0000000b3786790: at powerpc_interrupt+0x1a0 0xe0000000b37867e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb0a0 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b3786810 0xc000000019daf000 (tid 100732, pid 46011, "cc") KDB: stack backtrace of thread 100732: 0xe0000000b367ca70: at mi_switch+0x154 0xe0000000b367cab0: at turnstile_wait+0x3f8 0xe0000000b367cb20: at __rw_rlock_int+0x434 0xe0000000b367cbf0: at __rw_rlock_int+0x98 0xe0000000b367cc20: at vm_map_try_merge_entries+0x380 0xe0000000b367ccd0: at vm_map_insert+0x508 0xe0000000b367cdd0: at vm_map_fixed+0x11c 0xe0000000b367ce40: at elf64_stackgap+0x3ecc 0xe0000000b367ced0: at elf64_stackgap+0x3714 0xe0000000b367cfd0: at elf64_stackgap+0x2cf0 0xe0000000b367d180: at kern_execve+0x6b0 0xe0000000b367d5e0: at sys_execve+0x7c 0xe0000000b367d680: at trap+0xe48 0xe0000000b367d790: at powerpc_interrupt+0x1a0 0xe0000000b367d7e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb090 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b367d810 0xc000000053b75000 (tid 100805, pid 46021, "cc") KDB: stack backtrace of thread 100805: 0xe0000000b3915a70: at mi_switch+0x154 0xe0000000b3915ab0: at turnstile_wait+0x3f8 0xe0000000b3915b20: at __rw_rlock_int+0x434 0xe0000000b3915bf0: at __rw_rlock_int+0x98 0xe0000000b3915c20: at vm_map_try_merge_entries+0x380 0xe0000000b3915cd0: at vm_map_insert+0x508 0xe0000000b3915dd0: at vm_map_fixed+0x11c 0xe0000000b3915e40: at elf64_stackgap+0x3ecc 0xe0000000b3915ed0: at elf64_stackgap+0x3714 0xe0000000b3915fd0: at elf64_stackgap+0x2cf0 0xe0000000b3916180: at kern_execve+0x6b0 0xe0000000b39165e0: at sys_execve+0x7c 0xe0000000b3916680: at trap+0xe48 0xe0000000b3916790: at powerpc_interrupt+0x1a0 0xe0000000b39167e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb080 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b3916810 0xc00000001babc560 (tid 100793, pid 46007, "cc") KDB: stack backtrace of thread 100793: 0xe0000000b38a9a70: at mi_switch+0x154 0xe0000000b38a9ab0: at turnstile_wait+0x3f8 0xe0000000b38a9b20: at __rw_rlock_int+0x434 0xe0000000b38a9bf0: at __rw_rlock_int+0x98 0xe0000000b38a9c20: at vm_map_try_merge_entries+0x380 0xe0000000b38a9cd0: at vm_map_insert+0x508 0xe0000000b38a9dd0: at vm_map_fixed+0x11c 0xe0000000b38a9e40: at elf64_stackgap+0x3ecc 0xe0000000b38a9ed0: at elf64_stackgap+0x3714 0xe0000000b38a9fd0: at elf64_stackgap+0x2cf0 0xe0000000b38aa180: at kern_execve+0x6b0 0xe0000000b38aa5e0: at sys_execve+0x7c 0xe0000000b38aa680: at trap+0xe48 0xe0000000b38aa790: at powerpc_interrupt+0x1a0 0xe0000000b38aa7e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb0a0 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b38aa810 0xc00000006bac3000 (tid 100958, pid 46006, "cc") KDB: stack backtrace of thread 100958: 0xe0000000b3e8ea70: at mi_switch+0x154 0xe0000000b3e8eab0: at turnstile_wait+0x3f8 0xe0000000b3e8eb20: at __rw_rlock_int+0x434 0xe0000000b3e8ebf0: at __rw_rlock_int+0x98 0xe0000000b3e8ec20: at vm_map_try_merge_entries+0x380 0xe0000000b3e8ecd0: at vm_map_insert+0x508 0xe0000000b3e8edd0: at vm_map_fixed+0x11c 0xe0000000b3e8ee40: at elf64_stackgap+0x3ecc 0xe0000000b3e8eed0: at elf64_stackgap+0x3714 0xe0000000b3e8efd0: at elf64_stackgap+0x2cf0 0xe0000000b3e8f180: at kern_execve+0x6b0 0xe0000000b3e8f5e0: at sys_execve+0x7c 0xe0000000b3e8f680: at trap+0xe48 0xe0000000b3e8f790: at powerpc_interrupt+0x1a0 0xe0000000b3e8f7e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb090 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b3e8f810 0xc00000001ef15000 (tid 100420, pid 46025, "cc") KDB: stack backtrace of thread 100420: 0xe0000000b19f6a70: at mi_switch+0x154 0xe0000000b19f6ab0: at turnstile_wait+0x3f8 0xe0000000b19f6b20: at __rw_rlock_int+0x434 0xe0000000b19f6bf0: at __rw_rlock_int+0x98 0xe0000000b19f6c20: at vm_map_try_merge_entries+0x380 0xe0000000b19f6cd0: at vm_map_insert+0x508 0xe0000000b19f6dd0: at vm_map_fixed+0x11c 0xe0000000b19f6e40: at elf64_stackgap+0x3ecc 0xe0000000b19f6ed0: at elf64_stackgap+0x3714 0xe0000000b19f6fd0: at elf64_stackgap+0x2cf0 0xe0000000b19f7180: at kern_execve+0x6b0 0xe0000000b19f75e0: at sys_execve+0x7c 0xe0000000b19f7680: at trap+0xe48 0xe0000000b19f7790: at powerpc_interrupt+0x1a0 0xe0000000b19f77e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb080 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b19f7810 Exclusive Waiters: 0xc00000007bc33000 (tid 101477, pid 46019, "cc") KDB: stack backtrace of thread 101477: 0xe0000000b4642ed0: at mi_switch+0x154 0xe0000000b4642f10: at turnstile_wait+0x3f8 0xe0000000b4642f80: at __rw_wlock_hard+0x428 0xe0000000b4643070: at exec_map_first_page+0x634 0xe0000000b4643180: at kern_execve+0x3a4 0xe0000000b46435e0: at sys_execve+0x7c 0xe0000000b4643680: at trap+0xe48 0xe0000000b4643790: at powerpc_interrupt+0x1a0 0xe0000000b46437e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb090 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b4643810 0xc000000068365560 (tid 100999, pid 46018, "cc") KDB: stack backtrace of thread 100999: 0xe0000000b40041f0: at mi_switch+0x154 0xe0000000b4004230: at turnstile_wait+0x3f8 0xe0000000b40042a0: at __rw_wlock_hard+0x428 0xe0000000b4004390: at vm_page_sleep_if_busy+0xf8 0xe0000000b40043d0: at vm_fault+0xe98 0xe0000000b4004620: at vm_fault_trap+0x8c 0xe0000000b4004680: at trap+0x9c0 0xe0000000b4004790: at powerpc_interrupt+0x1a0 0xe0000000b40047e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbba0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4004810 0xc0000000280f8560 (tid 100717, pid 46023, "cc") KDB: stack backtrace of thread 100717: 0xe0000000b35f2230: at mi_switch+0x154 0xe0000000b35f2270: at turnstile_wait+0x3f8 0xe0000000b35f22e0: at __rw_wlock_hard+0x428 0xe0000000b35f23d0: at vm_fault+0xa14 0xe0000000b35f2620: at vm_fault_trap+0x8c 0xe0000000b35f2680: at trap+0x9c0 0xe0000000b35f2790: at powerpc_interrupt+0x1a0 0xe0000000b35f27e0: user DSI write trap @ 0x15041c50 by 0x8150885d8: srr1=0x900000000000d032 r1=0x3fffffffffffbc50 cr=0x28200000 xer=0 ctr=0x8150885b8 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b35f2810 0xc00000006bc90560 (tid 101045, pid 46016, "cc") KDB: stack backtrace of thread 101045: 0xe0000000b41aa230: at mi_switch+0x154 0xe0000000b41aa270: at turnstile_wait+0x3f8 0xe0000000b41aa2e0: at __rw_wlock_hard+0x428 0xe0000000b41aa3d0: at vm_fault+0xa14 0xe0000000b41aa620: at vm_fault_trap+0x8c 0xe0000000b41aa680: at trap+0x9c0 0xe0000000b41aa790: at powerpc_interrupt+0x1a0 0xe0000000b41aa7e0: user DSI write trap @ 0x14b75758 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbba0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b41aa810 0xc00000006809c000 (tid 100960, pid 46008, "cc") KDB: stack backtrace of thread 100960: 0xe0000000b3ea0cd0: at mi_switch+0x154 0xe0000000b3ea0d10: at turnstile_wait+0x3f8 0xe0000000b3ea0d80: at __rw_wlock_hard+0x428 0xe0000000b3ea0e70: at vm_imgact_map_page+0x160 0xe0000000b3ea0ed0: at elf64_stackgap+0x3798 0xe0000000b3ea0fd0: at elf64_stackgap+0x2cf0 0xe0000000b3ea1180: at kern_execve+0x6b0 0xe0000000b3ea15e0: at sys_execve+0x7c 0xe0000000b3ea1680: at trap+0xe48 0xe0000000b3ea1790: at powerpc_interrupt+0x1a0 0xe0000000b3ea17e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb080 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b3ea1810 0xc00000001d803000 (tid 100407, pid 46024, "cc") KDB: stack backtrace of thread 100407: 0xe0000000b1ec9cd0: at mi_switch+0x154 0xe0000000b1ec9d10: at turnstile_wait+0x3f8 0xe0000000b1ec9d80: at __rw_wlock_hard+0x428 0xe0000000b1ec9e70: at vm_imgact_map_page+0x160 0xe0000000b1ec9ed0: at elf64_stackgap+0x3798 0xe0000000b1ec9fd0: at elf64_stackgap+0x2cf0 0xe0000000b1eca180: at kern_execve+0x6b0 0xe0000000b1eca5e0: at sys_execve+0x7c 0xe0000000b1eca680: at trap+0xe48 0xe0000000b1eca790: at powerpc_interrupt+0x1a0 0xe0000000b1eca7e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb080 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b1eca810 0xc00000006ba9e000 (tid 101013, pid 46013, "cc") KDB: stack backtrace of thread 101013: 0xe0000000b4086230: at mi_switch+0x154 0xe0000000b4086270: at turnstile_wait+0x3f8 0xe0000000b40862e0: at __rw_wlock_hard+0x428 0xe0000000b40863d0: at vm_fault+0xa14 0xe0000000b4086620: at vm_fault_trap+0x8c 0xe0000000b4086680: at trap+0x9c0 0xe0000000b4086790: at powerpc_interrupt+0x1a0 0xe0000000b40867e0: user DSI write trap @ 0x15041c50 by 0x8150885d8: srr1=0x900000000000d032 r1=0x3fffffffffffbc30 cr=0x28200000 xer=0 ctr=0x8150885b8 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4086810 0xc00000007da1b000 (tid 101420, pid 45953, "cc") KDB: stack backtrace of thread 101420: 0xe0000000b54fb230: at mi_switch+0x154 0xe0000000b54fb270: at turnstile_wait+0x3f8 0xe0000000b54fb2e0: at __rw_wlock_hard+0x428 0xe0000000b54fb3d0: at vm_fault+0xa14 0xe0000000b54fb620: at vm_fault_trap+0x8c 0xe0000000b54fb680: at trap+0x9c0 0xe0000000b54fb790: at powerpc_interrupt+0x1a0 0xe0000000b54fb7e0: user DSI write trap @ 0x1507aa80 by 0x141a9600: srr1=0x900000000200f032 r1=0x3fffffffffff9860 cr=0x227200c2 xer=0x20040000 ctr=0x8154f2064 r2=0x15049db8 sr=0xa000000 frame=0xe0000000b54fb810 0xc00000001d10e560 (tid 100914, pid 46015, "cc") KDB: stack backtrace of thread 100914: 0xe0000000b3cfb230: at mi_switch+0x154 0xe0000000b3cfb270: at turnstile_wait+0x3f8 0xe0000000b3cfb2e0: at __rw_wlock_hard+0x428 0xe0000000b3cfb3d0: at vm_fault+0xa14 0xe0000000b3cfb620: at vm_fault_trap+0x8c 0xe0000000b3cfb680: at trap+0x9c0 0xe0000000b3cfb790: at powerpc_interrupt+0x1a0 0xe0000000b3cfb7e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbba0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3cfb810 0xc00000001baf6000 (tid 100384, pid 46027, "cc") KDB: stack backtrace of thread 100384: 0xe0000000b1e23230: at mi_switch+0x154 0xe0000000b1e23270: at turnstile_wait+0x3f8 0xe0000000b1e232e0: at __rw_wlock_hard+0x428 0xe0000000b1e233d0: at vm_fault+0xa14 0xe0000000b1e23620: at vm_fault_trap+0x8c 0xe0000000b1e23680: at trap+0x9c0 0xe0000000b1e23790: at powerpc_interrupt+0x1a0 0xe0000000b1e237e0: user DSI write trap @ 0x14b773a0 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbbb0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b1e23810 0xc00000001ac60560 (tid 100869, pid 46005, "cc") KDB: stack backtrace of thread 100869: 0xe0000000b3b5e230: at mi_switch+0x154 0xe0000000b3b5e270: at turnstile_wait+0x3f8 0xe0000000b3b5e2e0: at __rw_wlock_hard+0x428 0xe0000000b3b5e3d0: at vm_fault+0xa14 0xe0000000b3b5e620: at vm_fault_trap+0x8c 0xe0000000b3b5e680: at trap+0x9c0 0xe0000000b3b5e790: at powerpc_interrupt+0x1a0 0xe0000000b3b5e7e0: user DSI write trap @ 0x14b719a8 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0d0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3b5e810 0xc000000020ddd000 (tid 100828, pid 46028, "cc") KDB: stack backtrace of thread 100828: 0xe0000000b39e8cd0: at mi_switch+0x154 0xe0000000b39e8d10: at turnstile_wait+0x3f8 0xe0000000b39e8d80: at __rw_wlock_hard+0x428 0xe0000000b39e8e70: at vm_imgact_map_page+0x160 0xe0000000b39e8ed0: at elf64_stackgap+0x3798 0xe0000000b39e8fd0: at elf64_stackgap+0x2cf0 0xe0000000b39e9180: at kern_execve+0x6b0 0xe0000000b39e95e0: at sys_execve+0x7c 0xe0000000b39e9680: at trap+0xe48 0xe0000000b39e9790: at powerpc_interrupt+0x1a0 0xe0000000b39e97e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb070 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b39e9810 0xc0000000c51d2560 (tid 101619, pid 46026, "cc") KDB: stack backtrace of thread 101619: 0xe0000000b4ca1230: at mi_switch+0x154 0xe0000000b4ca1270: at turnstile_wait+0x3f8 0xe0000000b4ca12e0: at __rw_wlock_hard+0x428 0xe0000000b4ca13d0: at vm_fault+0xa14 0xe0000000b4ca1620: at vm_fault_trap+0x8c 0xe0000000b4ca1680: at trap+0x9c0 0xe0000000b4ca1790: at powerpc_interrupt+0x1a0 0xe0000000b4ca17e0: user DSI write trap @ 0x14b7b6d0 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbb90 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4ca1810 0xc00000007bedb560 (tid 101536, pid 46020, "cc") KDB: stack backtrace of thread 101536: 0xe0000000b4aaa230: at mi_switch+0x154 0xe0000000b4aaa270: at turnstile_wait+0x3f8 0xe0000000b4aaa2e0: at __rw_wlock_hard+0x428 0xe0000000b4aaa3d0: at vm_fault+0xa14 0xe0000000b4aaa620: at vm_fault_trap+0x8c 0xe0000000b4aaa680: at trap+0x9c0 0xe0000000b4aaa790: at powerpc_interrupt+0x1a0 0xe0000000b4aaa7e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbbb0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4aaa810 0xc00000007bdac560 (tid 101074, pid 46009, "cc") KDB: stack backtrace of thread 101074: 0xe0000000b55facd0: at mi_switch+0x154 0xe0000000b55fad10: at turnstile_wait+0x3f8 0xe0000000b55fad80: at __rw_wlock_hard+0x428 0xe0000000b55fae70: at vm_imgact_map_page+0x160 0xe0000000b55faed0: at elf64_stackgap+0x3798 0xe0000000b55fafd0: at elf64_stackgap+0x2cf0 0xe0000000b55fb180: at kern_execve+0x6b0 0xe0000000b55fb5e0: at sys_execve+0x7c 0xe0000000b55fb680: at trap+0xe48 0xe0000000b55fb790: at powerpc_interrupt+0x1a0 0xe0000000b55fb7e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb0a0 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b55fb810 0xc000000028305560 (tid 100713, pid 46030, "cc") KDB: stack backtrace of thread 100713: 0xe0000000b35ce230: at mi_switch+0x154 0xe0000000b35ce270: at turnstile_wait+0x3f8 0xe0000000b35ce2e0: at __rw_wlock_hard+0x428 0xe0000000b35ce3d0: at vm_fault+0xa14 0xe0000000b35ce620: at vm_fault_trap+0x8c 0xe0000000b35ce680: at trap+0x9c0 0xe0000000b35ce790: at powerpc_interrupt+0x1a0 0xe0000000b35ce7e0: user DSI write trap @ 0x15041c50 by 0x8150885d8: srr1=0x900000000000d032 r1=0x3fffffffffffbc60 cr=0x28200000 xer=0 ctr=0x8150885b8 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b35ce810 0xc00000001a1e5000 (tid 100901, pid 46022, "cc") KDB: stack backtrace of thread 100901: 0xe0000000b3c86230: at mi_switch+0x154 0xe0000000b3c86270: at turnstile_wait+0x3f8 0xe0000000b3c862e0: at __rw_wlock_hard+0x428 0xe0000000b3c863d0: at vm_fault+0xa14 0xe0000000b3c86620: at vm_fault_trap+0x8c 0xe0000000b3c86680: at trap+0x9c0 0xe0000000b3c86790: at powerpc_interrupt+0x1a0 0xe0000000b3c867e0: user DSI write trap @ 0x15041c50 by 0x8150885d8: srr1=0x900000000000d032 r1=0x3fffffffffffbc50 cr=0x28200000 xer=0 ctr=0x8150885b8 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3c86810 0xc0000000c544a560 (tid 101805, pid 46032, "cc") KDB: stack backtrace of thread 101805: 0xe0000000b5804230: at mi_switch+0x154 0xe0000000b5804270: at turnstile_wait+0x3f8 0xe0000000b58042e0: at __rw_wlock_hard+0x428 0xe0000000b58043d0: at vm_fault+0xa14 0xe0000000b5804620: at vm_fault_trap+0x8c 0xe0000000b5804680: at trap+0x9c0 0xe0000000b5804790: at powerpc_interrupt+0x1a0 0xe0000000b58047e0: user DSI write trap @ 0x15041c50 by 0x8150885d8: srr1=0x900000000000d032 r1=0x3fffffffffffc190 cr=0x28200000 xer=0 ctr=0x8150885b8 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b5804810 0xc00000001aefd000 (tid 100787, pid 46014, "cc") KDB: stack backtrace of thread 100787: 0xe0000000b3870230: at mi_switch+0x154 0xe0000000b3870270: at turnstile_wait+0x3f8 0xe0000000b38702e0: at __rw_wlock_hard+0x428 0xe0000000b38703d0: at vm_fault+0xa14 0xe0000000b3870620: at vm_fault_trap+0x8c 0xe0000000b3870680: at trap+0x9c0 0xe0000000b3870790: at powerpc_interrupt+0x1a0 0xe0000000b38707e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffbb80 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3870810 0xc00000001af09000 (tid 100807, pid 46017, "cc") KDB: stack backtrace of thread 100807: 0xe0000000b3927ed0: at mi_switch+0x154 0xe0000000b3927f10: at turnstile_wait+0x3f8 0xe0000000b3927f80: at __rw_wlock_hard+0x428 0xe0000000b3928070: at exec_map_first_page+0x634 0xe0000000b3928180: at kern_execve+0x3a4 0xe0000000b39285e0: at sys_execve+0x7c 0xe0000000b3928680: at trap+0xe48 0xe0000000b3928790: at powerpc_interrupt+0x1a0 0xe0000000b39287e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb090 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b3928810 0xc00000001b90e560 (tid 100427, pid 46010, "cc") KDB: stack backtrace of thread 100427: 0xe0000000b15f2ed0: at mi_switch+0x154 0xe0000000b15f2f10: at turnstile_wait+0x3f8 0xe0000000b15f2f80: at __rw_wlock_hard+0x428 0xe0000000b15f3070: at exec_map_first_page+0x634 0xe0000000b15f3180: at kern_execve+0x3a4 0xe0000000b15f35e0: at sys_execve+0x7c 0xe0000000b15f3680: at trap+0xe48 0xe0000000b15f3790: at powerpc_interrupt+0x1a0 0xe0000000b15f37e0: user SC trap by 0x8154fe310: srr1=0x900000000200f032 r1=0x3fffffffffffb090 cr=0x424802c2 xer=0 ctr=0x8154fe300 r2=0x8155cd378 frame=0xe0000000b15f3810 Pending Threads: empty