db> show turnstile 0xc000000019d88780 Lock: 0xc00000002ad60108 - (rw) vm object Lock Owner: none Shared Waiters: 0xc00000001baf6000 (tid 100384, pid 50140, "sh") KDB: stack backtrace of thread 100384: 0xe0000000b1e22a70: at mi_switch+0x154 0xe0000000b1e22ab0: at turnstile_wait+0x3f8 0xe0000000b1e22b20: at __rw_rlock_int+0x434 0xe0000000b1e22bf0: at __rw_rlock_int+0x98 0xe0000000b1e22c20: at vm_map_try_merge_entries+0x380 0xe0000000b1e22cd0: at vm_map_insert+0x508 0xe0000000b1e22dd0: at vm_map_fixed+0x11c 0xe0000000b1e22e40: at elf64_stackgap+0x3ecc 0xe0000000b1e22ed0: at elf64_stackgap+0x3714 0xe0000000b1e22fd0: at elf64_stackgap+0x2cf0 0xe0000000b1e23180: at kern_execve+0x6b0 0xe0000000b1e235e0: at sys_execve+0x7c 0xe0000000b1e23680: at trap+0xe48 0xe0000000b1e23790: at powerpc_interrupt+0x1a0 0xe0000000b1e237e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b1e23810 0xc000000068151560 (tid 100966, pid 50146, "sh") KDB: stack backtrace of thread 100966: 0xe0000000b3ed6a70: at mi_switch+0x154 0xe0000000b3ed6ab0: at turnstile_wait+0x3f8 0xe0000000b3ed6b20: at __rw_rlock_int+0x434 0xe0000000b3ed6bf0: at __rw_rlock_int+0x98 0xe0000000b3ed6c20: at vm_map_try_merge_entries+0x380 0xe0000000b3ed6cd0: at vm_map_insert+0x508 0xe0000000b3ed6dd0: at vm_map_fixed+0x11c 0xe0000000b3ed6e40: at elf64_stackgap+0x3ecc 0xe0000000b3ed6ed0: at elf64_stackgap+0x3714 0xe0000000b3ed6fd0: at elf64_stackgap+0x2cf0 0xe0000000b3ed7180: at kern_execve+0x6b0 0xe0000000b3ed75e0: at sys_execve+0x7c 0xe0000000b3ed7680: at trap+0xe48 0xe0000000b3ed7790: at powerpc_interrupt+0x1a0 0xe0000000b3ed77e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b3ed7810 Exclusive Waiters: 0xc00000006bac5560 (tid 100981, pid 50081, "cc") KDB: stack backtrace of thread 100981: 0xe0000000b3f5e230: at mi_switch+0x154 0xe0000000b3f5e270: at turnstile_wait+0x3f8 0xe0000000b3f5e2e0: at __rw_wlock_hard+0x428 0xe0000000b3f5e3d0: at vm_fault+0xa14 0xe0000000b3f5e620: at vm_fault_trap+0x8c 0xe0000000b3f5e680: at trap+0x9c0 0xe0000000b3f5e790: at powerpc_interrupt+0x1a0 0xe0000000b3f5e7e0: user DSI write trap @ 0x15075568 by 0x12e94b00: srr1=0x900000000200f032 r1=0x3fffffffffff8980 cr=0x42120222 xer=0 ctr=0x10ebbc88 r2=0x15049db8 sr=0xa000000 frame=0xe0000000b3f5e810 0xc0000000280f6000 (tid 100441, pid 50112, "cc") KDB: stack backtrace of thread 100441: 0xe0000000b1671230: at mi_switch+0x154 0xe0000000b1671270: at turnstile_wait+0x3f8 0xe0000000b16712e0: at __rw_wlock_hard+0x428 0xe0000000b16713d0: at vm_fault+0xa14 0xe0000000b1671620: at vm_fault_trap+0x8c 0xe0000000b1671680: at trap+0x9c0 0xe0000000b1671790: at powerpc_interrupt+0x1a0 0xe0000000b16717e0: user DSI write trap @ 0x14c80530 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0b0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b1671810 0xc00000006bac7000 (tid 100996, pid 50108, "cc") KDB: stack backtrace of thread 100996: 0xe0000000b3fe9230: at mi_switch+0x154 0xe0000000b3fe9270: at turnstile_wait+0x3f8 0xe0000000b3fe92e0: at __rw_wlock_hard+0x428 0xe0000000b3fe93d0: at vm_fault+0xa14 0xe0000000b3fe9620: at vm_fault_trap+0x8c 0xe0000000b3fe9680: at trap+0x9c0 0xe0000000b3fe9790: at powerpc_interrupt+0x1a0 0xe0000000b3fe97e0: user DSI write trap @ 0x14b7ac10 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0c0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3fe9810 0xc00000005ab05560 (tid 101029, pid 50110, "cc") KDB: stack backtrace of thread 101029: 0xe0000000b4116230: at mi_switch+0x154 0xe0000000b4116270: at turnstile_wait+0x3f8 0xe0000000b41162e0: at __rw_wlock_hard+0x428 0xe0000000b41163d0: at vm_fault+0xa14 0xe0000000b4116620: at vm_fault_trap+0x8c 0xe0000000b4116680: at trap+0x9c0 0xe0000000b4116790: at powerpc_interrupt+0x1a0 0xe0000000b41167e0: user DSI write trap @ 0x14b76940 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0c0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4116810 0xc000000068263560 (tid 100962, pid 50114, "sh") KDB: stack backtrace of thread 100962: 0xe0000000b3eb2cd0: at mi_switch+0x154 0xe0000000b3eb2d10: at turnstile_wait+0x3f8 0xe0000000b3eb2d80: at __rw_wlock_hard+0x428 0xe0000000b3eb2e70: at vm_imgact_map_page+0x160 0xe0000000b3eb2ed0: at elf64_stackgap+0x3798 0xe0000000b3eb2fd0: at elf64_stackgap+0x2cf0 0xe0000000b3eb3180: at kern_execve+0x6b0 0xe0000000b3eb35e0: at sys_execve+0x7c 0xe0000000b3eb3680: at trap+0xe48 0xe0000000b3eb3790: at powerpc_interrupt+0x1a0 0xe0000000b3eb37e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b3eb3810 0xc000000068367560 (tid 100990, pid 50142, "sh") KDB: stack backtrace of thread 100990: 0xe0000000b3fb2cd0: at mi_switch+0x154 0xe0000000b3fb2d10: at turnstile_wait+0x3f8 0xe0000000b3fb2d80: at __rw_wlock_hard+0x428 0xe0000000b3fb2e70: at vm_imgact_map_page+0x160 0xe0000000b3fb2ed0: at elf64_stackgap+0x3798 0xe0000000b3fb2fd0: at elf64_stackgap+0x2cf0 0xe0000000b3fb3180: at kern_execve+0x6b0 0xe0000000b3fb35e0: at sys_execve+0x7c 0xe0000000b3fb3680: at trap+0xe48 0xe0000000b3fb3790: at powerpc_interrupt+0x1a0 0xe0000000b3fb37e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b3fb3810 0xc00000007d909000 (tid 101546, pid 50126, "cc") KDB: stack backtrace of thread 101546: 0xe0000000b4d04230: at mi_switch+0x154 0xe0000000b4d04270: at turnstile_wait+0x3f8 0xe0000000b4d042e0: at __rw_wlock_hard+0x428 0xe0000000b4d043d0: at vm_fault+0xa14 0xe0000000b4d04620: at vm_fault_trap+0x8c 0xe0000000b4d04680: at trap+0x9c0 0xe0000000b4d04790: at powerpc_interrupt+0x1a0 0xe0000000b4d047e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0d0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4d04810 0xc00000001d10e000 (tid 100915, pid 50116, "cc") KDB: stack backtrace of thread 100915: 0xe0000000b3d04230: at mi_switch+0x154 0xe0000000b3d04270: at turnstile_wait+0x3f8 0xe0000000b3d042e0: at __rw_wlock_hard+0x428 0xe0000000b3d043d0: at vm_fault+0xa14 0xe0000000b3d04620: at vm_fault_trap+0x8c 0xe0000000b3d04680: at trap+0x9c0 0xe0000000b3d04790: at powerpc_interrupt+0x1a0 0xe0000000b3d047e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0b0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3d04810 0xc00000007da02560 (tid 101144, pid 50128, "cc") KDB: stack backtrace of thread 101144: 0xe0000000b4ce9230: at mi_switch+0x154 0xe0000000b4ce9270: at turnstile_wait+0x3f8 0xe0000000b4ce92e0: at __rw_wlock_hard+0x428 0xe0000000b4ce93d0: at vm_fault+0xa14 0xe0000000b4ce9620: at vm_fault_trap+0x8c 0xe0000000b4ce9680: at trap+0x9c0 0xe0000000b4ce9790: at powerpc_interrupt+0x1a0 0xe0000000b4ce97e0: user DSI write trap @ 0x14b75758 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0c0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4ce9810 0xc00000007bbb0560 (tid 101052, pid 50134, "cc") KDB: stack backtrace of thread 101052: 0xe0000000b41e9230: at mi_switch+0x154 0xe0000000b41e9270: at turnstile_wait+0x3f8 0xe0000000b41e92e0: at __rw_wlock_hard+0x428 0xe0000000b41e93d0: at vm_fault+0xa14 0xe0000000b41e9620: at vm_fault_trap+0x8c 0xe0000000b41e9680: at trap+0x9c0 0xe0000000b41e9790: at powerpc_interrupt+0x1a0 0xe0000000b41e97e0: user DSI write trap @ 0x14b719a8 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0d0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b41e9810 0xc000000020ddc560 (tid 100769, pid 50118, "cc") KDB: stack backtrace of thread 100769: 0xe0000000b37ce230: at mi_switch+0x154 0xe0000000b37ce270: at turnstile_wait+0x3f8 0xe0000000b37ce2e0: at __rw_wlock_hard+0x428 0xe0000000b37ce3d0: at vm_fault+0xa14 0xe0000000b37ce620: at vm_fault_trap+0x8c 0xe0000000b37ce680: at trap+0x9c0 0xe0000000b37ce790: at powerpc_interrupt+0x1a0 0xe0000000b37ce7e0: user DSI write trap @ 0x14b72d48 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0d0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b37ce810 0xc00000005bbc5000 (tid 100983, pid 50124, "cc") KDB: stack backtrace of thread 100983: 0xe0000000b3f70230: at mi_switch+0x154 0xe0000000b3f70270: at turnstile_wait+0x3f8 0xe0000000b3f702e0: at __rw_wlock_hard+0x428 0xe0000000b3f703d0: at vm_fault+0xa14 0xe0000000b3f70620: at vm_fault_trap+0x8c 0xe0000000b3f70680: at trap+0x9c0 0xe0000000b3f70790: at powerpc_interrupt+0x1a0 0xe0000000b3f707e0: user DSI write trap @ 0x14b70050 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0d0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b3f70810 0xc00000007b9cf000 (tid 101100, pid 50120, "cc") KDB: stack backtrace of thread 101100: 0xe0000000b4d3a230: at mi_switch+0x154 0xe0000000b4d3a270: at turnstile_wait+0x3f8 0xe0000000b4d3a2e0: at __rw_wlock_hard+0x428 0xe0000000b4d3a3d0: at vm_fault+0xa14 0xe0000000b4d3a620: at vm_fault_trap+0x8c 0xe0000000b4d3a680: at trap+0x9c0 0xe0000000b4d3a790: at powerpc_interrupt+0x1a0 0xe0000000b4d3a7e0: user DSI write trap @ 0x14b719a8 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0b0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b4d3a810 0xc00000007d938560 (tid 101655, pid 50136, "sh") KDB: stack backtrace of thread 101655: 0xe0000000b4a03ed0: at mi_switch+0x154 0xe0000000b4a03f10: at turnstile_wait+0x3f8 0xe0000000b4a03f80: at __rw_wlock_hard+0x428 0xe0000000b4a04070: at exec_map_first_page+0x634 0xe0000000b4a04180: at kern_execve+0x3a4 0xe0000000b4a045e0: at sys_execve+0x7c 0xe0000000b4a04680: at trap+0xe48 0xe0000000b4a04790: at powerpc_interrupt+0x1a0 0xe0000000b4a047e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b4a04810 0xc00000001d839560 (tid 100836, pid 50144, "sh") KDB: stack backtrace of thread 100836: 0xe0000000b3a30ed0: at mi_switch+0x154 0xe0000000b3a30f10: at turnstile_wait+0x3f8 0xe0000000b3a30f80: at __rw_wlock_hard+0x428 0xe0000000b3a31070: at exec_map_first_page+0x634 0xe0000000b3a31180: at kern_execve+0x3a4 0xe0000000b3a315e0: at sys_execve+0x7c 0xe0000000b3a31680: at trap+0xe48 0xe0000000b3a31790: at powerpc_interrupt+0x1a0 0xe0000000b3a317e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b3a31810 0xc00000007bd49560 (tid 101555, pid 50130, "cc") KDB: stack backtrace of thread 101555: 0xe0000000b42e0230: at mi_switch+0x154 0xe0000000b42e0270: at turnstile_wait+0x3f8 0xe0000000b42e02e0: at __rw_wlock_hard+0x428 0xe0000000b42e03d0: at vm_fault+0xa14 0xe0000000b42e0620: at vm_fault_trap+0x8c 0xe0000000b42e0680: at trap+0x9c0 0xe0000000b42e0790: at powerpc_interrupt+0x1a0 0xe0000000b42e07e0: user DSI write trap @ 0x14b75758 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0c0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b42e0810 0xc00000007bccd560 (tid 101048, pid 50132, "sh") KDB: stack backtrace of thread 101048: 0xe0000000b41c4cd0: at mi_switch+0x154 0xe0000000b41c4d10: at turnstile_wait+0x3f8 0xe0000000b41c4d80: at __rw_wlock_hard+0x428 0xe0000000b41c4e70: at vm_imgact_map_page+0x160 0xe0000000b41c4ed0: at elf64_stackgap+0x3798 0xe0000000b41c4fd0: at elf64_stackgap+0x2cf0 0xe0000000b41c5180: at kern_execve+0x6b0 0xe0000000b41c55e0: at sys_execve+0x7c 0xe0000000b41c5680: at trap+0xe48 0xe0000000b41c5790: at powerpc_interrupt+0x1a0 0xe0000000b41c57e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b41c5810 0xc0000000c50cc000 (tid 101147, pid 50122, "cc") KDB: stack backtrace of thread 101147: 0xe0000000b58ce230: at mi_switch+0x154 0xe0000000b58ce270: at turnstile_wait+0x3f8 0xe0000000b58ce2e0: at __rw_wlock_hard+0x428 0xe0000000b58ce3d0: at vm_fault+0xa14 0xe0000000b58ce620: at vm_fault_trap+0x8c 0xe0000000b58ce680: at trap+0x9c0 0xe0000000b58ce790: at powerpc_interrupt+0x1a0 0xe0000000b58ce7e0: user DSI write trap @ 0x14b75758 by 0x8150804c4: srr1=0x900000000200d032 r1=0x3fffffffffffc0c0 cr=0x82200800 xer=0 ctr=0x8150805d0 r2=0x8150a85d0 sr=0xa000000 frame=0xe0000000b58ce810 0xc00000007bddd000 (tid 101044, pid 50149, "sh") KDB: stack backtrace of thread 101044: 0xe0000000b41a0ed0: at mi_switch+0x154 0xe0000000b41a0f10: at turnstile_wait+0x3f8 0xe0000000b41a0f80: at __rw_wlock_hard+0x428 0xe0000000b41a1070: at exec_map_first_page+0x634 0xe0000000b41a1180: at kern_execve+0x3a4 0xe0000000b41a15e0: at sys_execve+0x7c 0xe0000000b41a1680: at trap+0xe48 0xe0000000b41a1790: at powerpc_interrupt+0x1a0 0xe0000000b41a17e0: user SC trap by 0x810288310: srr1=0x900000000200f032 r1=0x3fffffffffffc910 cr=0x22480380 xer=0 ctr=0x810288300 r2=0x810357378 frame=0xe0000000b41a1810 Pending Threads: empty