db> show turnstile 0xc0002000136b4300 Lock: 0xc00000004f49be70 - (rw) vm object Lock Owner: none Shared Waiters: 0xc00000009d419560 (tid 105959, pid 95324, "cc") KDB: stack backtrace of thread 105959: 0xe00000012bf6aa80: at mi_switch+0x144 0xe00000012bf6aac0: at turnstile_wait+0x3f8 0xe00000012bf6ab30: at __rw_rlock_hard+0x370 0xe00000012bf6ac00: at __rw_rlock_int+0x98 0xe00000012bf6ac30: at vm_map_pmap_enter+0x198 0xe00000012bf6ace0: at vm_map_insert+0x52c 0xe00000012bf6ade0: at vm_map_fixed+0x11c 0xe00000012bf6ae50: at elf64_map_insert+0x230 0xe00000012bf6aee0: at elf64_load_sections+0x188 0xe00000012bf6afe0: at exec_elf64_imgact+0xd60 0xe00000012bf6b180: at kern_execve+0x6a4 0xe00000012bf6b5e0: at sys_execve+0x7c 0xe00000012bf6b680: at trap+0xdc4 0xe00000012bf6b790: at powerpc_interrupt+0x1a0 0xe00000012bf6b7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012bf6b810 0xc0002000a185e000 (tid 105254, pid 95378, "cc") KDB: stack backtrace of thread 105254: 0xe00000012d42ba80: at mi_switch+0x144 0xe00000012d42bac0: at turnstile_wait+0x3f8 0xe00000012d42bb30: at __rw_rlock_hard+0x370 0xe00000012d42bc00: at __rw_rlock_int+0x98 0xe00000012d42bc30: at vm_map_pmap_enter+0x198 0xe00000012d42bce0: at vm_map_insert+0x52c 0xe00000012d42bde0: at vm_map_fixed+0x11c 0xe00000012d42be50: at elf64_map_insert+0x230 0xe00000012d42bee0: at elf64_load_sections+0x188 0xe00000012d42bfe0: at exec_elf64_imgact+0xd60 0xe00000012d42c180: at kern_execve+0x6a4 0xe00000012d42c5e0: at sys_execve+0x7c 0xe00000012d42c680: at trap+0xdc4 0xe00000012d42c790: at powerpc_interrupt+0x1a0 0xe00000012d42c7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012d42c810 0xc00000022f71e000 (tid 105727, pid 95365, "cc") KDB: stack backtrace of thread 105727: 0xe00000012efdfa80: at mi_switch+0x144 0xe00000012efdfac0: at turnstile_wait+0x3f8 0xe00000012efdfb30: at __rw_rlock_hard+0x370 0xe00000012efdfc00: at __rw_rlock_int+0x98 0xe00000012efdfc30: at vm_map_pmap_enter+0x198 0xe00000012efdfce0: at vm_map_insert+0x52c 0xe00000012efdfde0: at vm_map_fixed+0x11c 0xe00000012efdfe50: at elf64_map_insert+0x230 0xe00000012efdfee0: at elf64_load_sections+0x188 0xe00000012efdffe0: at exec_elf64_imgact+0xd60 0xe00000012efe0180: at kern_execve+0x6a4 0xe00000012efe05e0: at sys_execve+0x7c 0xe00000012efe0680: at trap+0xdc4 0xe00000012efe0790: at powerpc_interrupt+0x1a0 0xe00000012efe07e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012efe0810 0xc000000050156560 (tid 105074, pid 95337, "cc") KDB: stack backtrace of thread 105074: 0xe000000126efba80: at mi_switch+0x144 0xe000000126efbac0: at turnstile_wait+0x3f8 0xe000000126efbb30: at __rw_rlock_hard+0x370 0xe000000126efbc00: at __rw_rlock_int+0x98 0xe000000126efbc30: at vm_map_pmap_enter+0x198 0xe000000126efbce0: at vm_map_insert+0x52c 0xe000000126efbde0: at vm_map_fixed+0x11c 0xe000000126efbe50: at elf64_map_insert+0x230 0xe000000126efbee0: at elf64_load_sections+0x188 0xe000000126efbfe0: at exec_elf64_imgact+0xd60 0xe000000126efc180: at kern_execve+0x6a4 0xe000000126efc5e0: at sys_execve+0x7c 0xe000000126efc680: at trap+0xdc4 0xe000000126efc790: at powerpc_interrupt+0x1a0 0xe000000126efc7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000126efc810 0xc0002001186b3000 (tid 105791, pid 95371, "cc") KDB: stack backtrace of thread 105791: 0xe00000012e646a80: at mi_switch+0x144 0xe00000012e646ac0: at turnstile_wait+0x3f8 0xe00000012e646b30: at __rw_rlock_hard+0x370 0xe00000012e646c00: at __rw_rlock_int+0x98 0xe00000012e646c30: at vm_map_pmap_enter+0x198 0xe00000012e646ce0: at vm_map_insert+0x52c 0xe00000012e646de0: at vm_map_fixed+0x11c 0xe00000012e646e50: at elf64_map_insert+0x230 0xe00000012e646ee0: at elf64_load_sections+0x188 0xe00000012e646fe0: at exec_elf64_imgact+0xd60 0xe00000012e647180: at kern_execve+0x6a4 0xe00000012e6475e0: at sys_execve+0x7c 0xe00000012e647680: at trap+0xdc4 0xe00000012e647790: at powerpc_interrupt+0x1a0 0xe00000012e6477e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012e647810 0xc0000000baa7e560 (tid 105176, pid 95369, "cc") KDB: stack backtrace of thread 105176: 0xe00000012c56aa80: at mi_switch+0x144 0xe00000012c56aac0: at turnstile_wait+0x3f8 0xe00000012c56ab30: at __rw_rlock_hard+0x370 0xe00000012c56ac00: at __rw_rlock_int+0x98 0xe00000012c56ac30: at vm_map_pmap_enter+0x198 0xe00000012c56ace0: at vm_map_insert+0x52c 0xe00000012c56ade0: at vm_map_fixed+0x11c 0xe00000012c56ae50: at elf64_map_insert+0x230 0xe00000012c56aee0: at elf64_load_sections+0x188 0xe00000012c56afe0: at exec_elf64_imgact+0xd60 0xe00000012c56b180: at kern_execve+0x6a4 0xe00000012c56b5e0: at sys_execve+0x7c 0xe00000012c56b680: at trap+0xdc4 0xe00000012c56b790: at powerpc_interrupt+0x1a0 0xe00000012c56b7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012c56b810 0xc00000009ccfa000 (tid 105940, pid 95346, "cc") KDB: stack backtrace of thread 105940: 0xe00000012d7bba80: at mi_switch+0x144 0xe00000012d7bbac0: at turnstile_wait+0x3f8 0xe00000012d7bbb30: at __rw_rlock_hard+0x370 0xe00000012d7bbc00: at __rw_rlock_int+0x98 0xe00000012d7bbc30: at vm_map_pmap_enter+0x198 0xe00000012d7bbce0: at vm_map_insert+0x52c 0xe00000012d7bbde0: at vm_map_fixed+0x11c 0xe00000012d7bbe50: at elf64_map_insert+0x230 0xe00000012d7bbee0: at elf64_load_sections+0x188 0xe00000012d7bbfe0: at exec_elf64_imgact+0xd60 0xe00000012d7bc180: at kern_execve+0x6a4 0xe00000012d7bc5e0: at sys_execve+0x7c 0xe00000012d7bc680: at trap+0xdc4 0xe00000012d7bc790: at powerpc_interrupt+0x1a0 0xe00000012d7bc7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012d7bc810 0xc00000005012b560 (tid 103245, pid 95332, "cc") KDB: stack backtrace of thread 103245: 0xe000000101a19a80: at mi_switch+0x144 0xe000000101a19ac0: at turnstile_wait+0x3f8 0xe000000101a19b30: at __rw_rlock_hard+0x370 0xe000000101a19c00: at __rw_rlock_int+0x98 0xe000000101a19c30: at vm_map_pmap_enter+0x198 0xe000000101a19ce0: at vm_map_insert+0x52c 0xe000000101a19de0: at vm_map_fixed+0x11c 0xe000000101a19e50: at elf64_map_insert+0x230 0xe000000101a19ee0: at elf64_load_sections+0x188 0xe000000101a19fe0: at exec_elf64_imgact+0xd60 0xe000000101a1a180: at kern_execve+0x6a4 0xe000000101a1a5e0: at sys_execve+0x7c 0xe000000101a1a680: at trap+0xdc4 0xe000000101a1a790: at powerpc_interrupt+0x1a0 0xe000000101a1a7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000101a1a810 0xc00000022d787560 (tid 105408, pid 95368, "cc") KDB: stack backtrace of thread 105408: 0xe000000131019a80: at mi_switch+0x144 0xe000000131019ac0: at turnstile_wait+0x3f8 0xe000000131019b30: at __rw_rlock_hard+0x370 0xe000000131019c00: at __rw_rlock_int+0x98 0xe000000131019c30: at vm_map_pmap_enter+0x198 0xe000000131019ce0: at vm_map_insert+0x52c 0xe000000131019de0: at vm_map_fixed+0x11c 0xe000000131019e50: at elf64_map_insert+0x230 0xe000000131019ee0: at elf64_load_sections+0x188 0xe000000131019fe0: at exec_elf64_imgact+0xd60 0xe00000013101a180: at kern_execve+0x6a4 0xe00000013101a5e0: at sys_execve+0x7c 0xe00000013101a680: at trap+0xdc4 0xe00000013101a790: at powerpc_interrupt+0x1a0 0xe00000013101a7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000013101a810 0xc000200062020000 (tid 105035, pid 95358, "cc") KDB: stack backtrace of thread 105035: 0xe0000001250fba80: at mi_switch+0x144 0xe0000001250fbac0: at turnstile_wait+0x3f8 0xe0000001250fbb30: at __rw_rlock_hard+0x370 0xe0000001250fbc00: at __rw_rlock_int+0x98 0xe0000001250fbc30: at vm_map_pmap_enter+0x198 0xe0000001250fbce0: at vm_map_insert+0x52c 0xe0000001250fbde0: at vm_map_fixed+0x11c 0xe0000001250fbe50: at elf64_map_insert+0x230 0xe0000001250fbee0: at elf64_load_sections+0x188 0xe0000001250fbfe0: at exec_elf64_imgact+0xd60 0xe0000001250fc180: at kern_execve+0x6a4 0xe0000001250fc5e0: at sys_execve+0x7c 0xe0000001250fc680: at trap+0xdc4 0xe0000001250fc790: at powerpc_interrupt+0x1a0 0xe0000001250fc7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe0000001250fc810 0xc00000022e597560 (tid 105482, pid 95339, "cc") KDB: stack backtrace of thread 105482: 0xe000000130acda80: at mi_switch+0x144 0xe000000130acdac0: at turnstile_wait+0x3f8 0xe000000130acdb30: at __rw_rlock_hard+0x370 0xe000000130acdc00: at __rw_rlock_int+0x98 0xe000000130acdc30: at vm_map_pmap_enter+0x198 0xe000000130acdce0: at vm_map_insert+0x52c 0xe000000130acdde0: at vm_map_fixed+0x11c 0xe000000130acde50: at elf64_map_insert+0x230 0xe000000130acdee0: at elf64_load_sections+0x188 0xe000000130acdfe0: at exec_elf64_imgact+0xd60 0xe000000130ace180: at kern_execve+0x6a4 0xe000000130ace5e0: at sys_execve+0x7c 0xe000000130ace680: at trap+0xdc4 0xe000000130ace790: at powerpc_interrupt+0x1a0 0xe000000130ace7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000130ace810 0xc0002000a172d560 (tid 105288, pid 95325, "cc") KDB: stack backtrace of thread 105288: 0xe00000012d16aa80: at mi_switch+0x144 0xe00000012d16aac0: at turnstile_wait+0x3f8 0xe00000012d16ab30: at __rw_rlock_hard+0x370 0xe00000012d16ac00: at __rw_rlock_int+0x98 0xe00000012d16ac30: at vm_map_pmap_enter+0x198 0xe00000012d16ace0: at vm_map_insert+0x52c 0xe00000012d16ade0: at vm_map_fixed+0x11c 0xe00000012d16ae50: at elf64_map_insert+0x230 0xe00000012d16aee0: at elf64_load_sections+0x188 0xe00000012d16afe0: at exec_elf64_imgact+0xd60 0xe00000012d16b180: at kern_execve+0x6a4 0xe00000012d16b5e0: at sys_execve+0x7c 0xe00000012d16b680: at trap+0xdc4 0xe00000012d16b790: at powerpc_interrupt+0x1a0 0xe00000012d16b7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012d16b810 0xc000000050167000 (tid 105763, pid 95329, "cc") KDB: stack backtrace of thread 105763: 0xe00000012e93da80: at mi_switch+0x144 0xe00000012e93dac0: at turnstile_wait+0x3f8 0xe00000012e93db30: at __rw_rlock_hard+0x370 0xe00000012e93dc00: at __rw_rlock_int+0x98 0xe00000012e93dc30: at vm_map_pmap_enter+0x198 0xe00000012e93dce0: at vm_map_insert+0x52c 0xe00000012e93dde0: at vm_map_fixed+0x11c 0xe00000012e93de50: at elf64_map_insert+0x230 0xe00000012e93dee0: at elf64_load_sections+0x188 0xe00000012e93dfe0: at exec_elf64_imgact+0xd60 0xe00000012e93e180: at kern_execve+0x6a4 0xe00000012e93e5e0: at sys_execve+0x7c 0xe00000012e93e680: at trap+0xdc4 0xe00000012e93e790: at powerpc_interrupt+0x1a0 0xe00000012e93e7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012e93e810 0xc0002001216a5000 (tid 105948, pid 95379, "cc") KDB: stack backtrace of thread 105948: 0xe00000012bf10a80: at mi_switch+0x144 0xe00000012bf10ac0: at turnstile_wait+0x3f8 0xe00000012bf10b30: at __rw_rlock_hard+0x370 0xe00000012bf10c00: at __rw_rlock_int+0x98 0xe00000012bf10c30: at vm_map_pmap_enter+0x198 0xe00000012bf10ce0: at vm_map_insert+0x52c 0xe00000012bf10de0: at vm_map_fixed+0x11c 0xe00000012bf10e50: at elf64_map_insert+0x230 0xe00000012bf10ee0: at elf64_load_sections+0x188 0xe00000012bf10fe0: at exec_elf64_imgact+0xd60 0xe00000012bf11180: at kern_execve+0x6a4 0xe00000012bf115e0: at sys_execve+0x7c 0xe00000012bf11680: at trap+0xdc4 0xe00000012bf11790: at powerpc_interrupt+0x1a0 0xe00000012bf117e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012bf11810 0xc000200011ce0560 (tid 104614, pid 95364, "cc") KDB: stack backtrace of thread 104614: 0xe00000010e8fba80: at mi_switch+0x144 0xe00000010e8fbac0: at turnstile_wait+0x3f8 0xe00000010e8fbb30: at __rw_rlock_hard+0x370 0xe00000010e8fbc00: at __rw_rlock_int+0x98 0xe00000010e8fbc30: at vm_map_pmap_enter+0x198 0xe00000010e8fbce0: at vm_map_insert+0x52c 0xe00000010e8fbde0: at vm_map_fixed+0x11c 0xe00000010e8fbe50: at elf64_map_insert+0x230 0xe00000010e8fbee0: at elf64_load_sections+0x188 0xe00000010e8fbfe0: at exec_elf64_imgact+0xd60 0xe00000010e8fc180: at kern_execve+0x6a4 0xe00000010e8fc5e0: at sys_execve+0x7c 0xe00000010e8fc680: at trap+0xdc4 0xe00000010e8fc790: at powerpc_interrupt+0x1a0 0xe00000010e8fc7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000010e8fc810 0xc00000009cb69560 (tid 105839, pid 95356, "cc") KDB: stack backtrace of thread 105839: 0xe00000012e010a80: at mi_switch+0x144 0xe00000012e010ac0: at turnstile_wait+0x3f8 0xe00000012e010b30: at __rw_rlock_hard+0x370 0xe00000012e010c00: at __rw_rlock_int+0x98 0xe00000012e010c30: at vm_map_pmap_enter+0x198 0xe00000012e010ce0: at vm_map_insert+0x52c 0xe00000012e010de0: at vm_map_fixed+0x11c 0xe00000012e010e50: at elf64_map_insert+0x230 0xe00000012e010ee0: at elf64_load_sections+0x188 0xe00000012e010fe0: at exec_elf64_imgact+0xd60 0xe00000012e011180: at kern_execve+0x6a4 0xe00000012e0115e0: at sys_execve+0x7c 0xe00000012e011680: at trap+0xdc4 0xe00000012e011790: at powerpc_interrupt+0x1a0 0xe00000012e0117e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012e011810 0xc00020000d6fe560 (tid 104790, pid 95373, "cc") KDB: stack backtrace of thread 104790: 0xe000000122934a80: at mi_switch+0x144 0xe000000122934ac0: at turnstile_wait+0x3f8 0xe000000122934b30: at __rw_rlock_hard+0x370 0xe000000122934c00: at __rw_rlock_int+0x98 0xe000000122934c30: at vm_map_pmap_enter+0x198 0xe000000122934ce0: at vm_map_insert+0x52c 0xe000000122934de0: at vm_map_fixed+0x11c 0xe000000122934e50: at elf64_map_insert+0x230 0xe000000122934ee0: at elf64_load_sections+0x188 0xe000000122934fe0: at exec_elf64_imgact+0xd60 0xe000000122935180: at kern_execve+0x6a4 0xe0000001229355e0: at sys_execve+0x7c 0xe000000122935680: at trap+0xdc4 0xe000000122935790: at powerpc_interrupt+0x1a0 0xe0000001229357e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000122935810 0xc0000000500f3000 (tid 104731, pid 95349, "cc") KDB: stack backtrace of thread 104731: 0xe000000122f10a80: at mi_switch+0x144 0xe000000122f10ac0: at turnstile_wait+0x3f8 0xe000000122f10b30: at __rw_rlock_hard+0x370 0xe000000122f10c00: at __rw_rlock_int+0x98 0xe000000122f10c30: at vm_map_pmap_enter+0x198 0xe000000122f10ce0: at vm_map_insert+0x52c 0xe000000122f10de0: at vm_map_fixed+0x11c 0xe000000122f10e50: at elf64_map_insert+0x230 0xe000000122f10ee0: at elf64_load_sections+0x188 0xe000000122f10fe0: at exec_elf64_imgact+0xd60 0xe000000122f11180: at kern_execve+0x6a4 0xe000000122f115e0: at sys_execve+0x7c 0xe000000122f11680: at trap+0xdc4 0xe000000122f11790: at powerpc_interrupt+0x1a0 0xe000000122f117e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000122f11810 0xc000200012e0d000 (tid 104457, pid 95333, "cc") KDB: stack backtrace of thread 104457: 0xe0000001145fba80: at mi_switch+0x144 0xe0000001145fbac0: at turnstile_wait+0x3f8 0xe0000001145fbb30: at __rw_rlock_hard+0x370 0xe0000001145fbc00: at __rw_rlock_int+0x98 0xe0000001145fbc30: at vm_map_pmap_enter+0x198 0xe0000001145fbce0: at vm_map_insert+0x52c 0xe0000001145fbde0: at vm_map_fixed+0x11c 0xe0000001145fbe50: at elf64_map_insert+0x230 0xe0000001145fbee0: at elf64_load_sections+0x188 0xe0000001145fbfe0: at exec_elf64_imgact+0xd60 0xe0000001145fc180: at kern_execve+0x6a4 0xe0000001145fc5e0: at sys_execve+0x7c 0xe0000001145fc680: at trap+0xdc4 0xe0000001145fc790: at powerpc_interrupt+0x1a0 0xe0000001145fc7e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe0000001145fc810 0xc00020000d64f000 (tid 105573, pid 95347, "cc") KDB: stack backtrace of thread 105573: 0xe00000012fe34a80: at mi_switch+0x144 0xe00000012fe34ac0: at turnstile_wait+0x3f8 0xe00000012fe34b30: at __rw_rlock_hard+0x370 0xe00000012fe34c00: at __rw_rlock_int+0x98 0xe00000012fe34c30: at vm_map_pmap_enter+0x198 0xe00000012fe34ce0: at vm_map_insert+0x52c 0xe00000012fe34de0: at vm_map_fixed+0x11c 0xe00000012fe34e50: at elf64_map_insert+0x230 0xe00000012fe34ee0: at elf64_load_sections+0x188 0xe00000012fe34fe0: at exec_elf64_imgact+0xd60 0xe00000012fe35180: at kern_execve+0x6a4 0xe00000012fe355e0: at sys_execve+0x7c 0xe00000012fe35680: at trap+0xdc4 0xe00000012fe35790: at powerpc_interrupt+0x1a0 0xe00000012fe357e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012fe35810 0xc0002000a3e7a560 (tid 105485, pid 95374, "cc") KDB: stack backtrace of thread 105485: 0xe000000130ae8a80: at mi_switch+0x144 0xe000000130ae8ac0: at turnstile_wait+0x3f8 0xe000000130ae8b30: at __rw_rlock_hard+0x370 0xe000000130ae8c00: at __rw_rlock_int+0x98 0xe000000130ae8c30: at vm_map_pmap_enter+0x198 0xe000000130ae8ce0: at vm_map_insert+0x52c 0xe000000130ae8de0: at vm_map_fixed+0x11c 0xe000000130ae8e50: at elf64_map_insert+0x230 0xe000000130ae8ee0: at elf64_load_sections+0x188 0xe000000130ae8fe0: at exec_elf64_imgact+0xd60 0xe000000130ae9180: at kern_execve+0x6a4 0xe000000130ae95e0: at sys_execve+0x7c 0xe000000130ae9680: at trap+0xdc4 0xe000000130ae9790: at powerpc_interrupt+0x1a0 0xe000000130ae97e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000130ae9810 0xc00020001241a000 (tid 102427, pid 95375, "cc") KDB: stack backtrace of thread 102427: 0xe000000100807a80: at mi_switch+0x144 0xe000000100807ac0: at turnstile_wait+0x3f8 0xe000000100807b30: at __rw_rlock_hard+0x370 0xe000000100807c00: at __rw_rlock_int+0x98 0xe000000100807c30: at vm_map_pmap_enter+0x198 0xe000000100807ce0: at vm_map_insert+0x52c 0xe000000100807de0: at vm_map_fixed+0x11c 0xe000000100807e50: at elf64_map_insert+0x230 0xe000000100807ee0: at elf64_load_sections+0x188 0xe000000100807fe0: at exec_elf64_imgact+0xd60 0xe000000100808180: at kern_execve+0x6a4 0xe0000001008085e0: at sys_execve+0x7c 0xe000000100808680: at trap+0xdc4 0xe000000100808790: at powerpc_interrupt+0x1a0 0xe0000001008087e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000100808810 0xc0000000a83dd000 (tid 105900, pid 95363, "cc") KDB: stack backtrace of thread 105900: 0xe00000012da46a80: at mi_switch+0x144 0xe00000012da46ac0: at turnstile_wait+0x3f8 0xe00000012da46b30: at __rw_rlock_hard+0x370 0xe00000012da46c00: at __rw_rlock_int+0x98 0xe00000012da46c30: at vm_map_pmap_enter+0x198 0xe00000012da46ce0: at vm_map_insert+0x52c 0xe00000012da46de0: at vm_map_fixed+0x11c 0xe00000012da46e50: at elf64_map_insert+0x230 0xe00000012da46ee0: at elf64_load_sections+0x188 0xe00000012da46fe0: at exec_elf64_imgact+0xd60 0xe00000012da47180: at kern_execve+0x6a4 0xe00000012da475e0: at sys_execve+0x7c 0xe00000012da47680: at trap+0xdc4 0xe00000012da47790: at powerpc_interrupt+0x1a0 0xe00000012da477e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe00000012da47810 0xc00020001cb9b560 (tid 104645, pid 95350, "cc") KDB: stack backtrace of thread 104645: 0xe000000123546a80: at mi_switch+0x144 0xe000000123546ac0: at turnstile_wait+0x3f8 0xe000000123546b30: at __rw_rlock_hard+0x370 0xe000000123546c00: at __rw_rlock_int+0x98 0xe000000123546c30: at vm_map_pmap_enter+0x198 0xe000000123546ce0: at vm_map_insert+0x52c 0xe000000123546de0: at vm_map_fixed+0x11c 0xe000000123546e50: at elf64_map_insert+0x230 0xe000000123546ee0: at elf64_load_sections+0x188 0xe000000123546fe0: at exec_elf64_imgact+0xd60 0xe000000123547180: at kern_execve+0x6a4 0xe0000001235475e0: at sys_execve+0x7c 0xe000000123547680: at trap+0xdc4 0xe000000123547790: at powerpc_interrupt+0x1a0 0xe0000001235477e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9750 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe000000123547810 0xc00000004b207560 (tid 104598, pid 95360, "cc") KDB: stack backtrace of thread 104598: 0xe0000001042b7a80: at mi_switch+0x144 0xe0000001042b7ac0: at turnstile_wait+0x3f8 0xe0000001042b7b30: at __rw_rlock_hard+0x370 0xe0000001042b7c00: at __rw_rlock_int+0x98 0xe0000001042b7c30: at vm_map_pmap_enter+0x198 0xe0000001042b7ce0: at vm_map_insert+0x52c 0xe0000001042b7de0: at vm_map_fixed+0x11c 0xe0000001042b7e50: at elf64_map_insert+0x230 0xe0000001042b7ee0: at elf64_load_sections+0x188 0xe0000001042b7fe0: at exec_elf64_imgact+0xd60 0xe0000001042b8180: at kern_execve+0x6a4 0xe0000001042b85e0: at sys_execve+0x7c 0xe0000001042b8680: at trap+0xdc4 0xe0000001042b8790: at powerpc_interrupt+0x1a0 0xe0000001042b87e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe0000001042b8810 Exclusive Waiters: 0xc000200011c0f000 (tid 105094, pid 95385, "cc") KDB: stack backtrace of thread 105094: 0xe00000012a7fc230: at mi_switch+0x144 0xe00000012a7fc270: at turnstile_wait+0x3f8 0xe00000012a7fc2e0: at __rw_wlock_hard+0x438 0xe00000012a7fc3d0: at vm_fault+0xa1c 0xe00000012a7fc620: at vm_fault_trap+0x8c 0xe00000012a7fc680: at trap+0x9a8 0xe00000012a7fc790: at powerpc_interrupt+0x1a0 0xe00000012a7fc7e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa790 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012a7fc810 0xc0002001219d1560 (tid 106012, pid 95326, "cc") KDB: stack backtrace of thread 106012: 0xe00000012b962230: at mi_switch+0x144 0xe00000012b962270: at turnstile_wait+0x3f8 0xe00000012b9622e0: at __rw_wlock_hard+0x438 0xe00000012b9623d0: at vm_fault+0xa1c 0xe00000012b962620: at vm_fault_trap+0x8c 0xe00000012b962680: at trap+0x9a8 0xe00000012b962790: at powerpc_interrupt+0x1a0 0xe00000012b9627e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012b962810 0xc00020001ca96000 (tid 105569, pid 95393, "cc") KDB: stack backtrace of thread 105569: 0xe00000012fe11230: at mi_switch+0x144 0xe00000012fe11270: at turnstile_wait+0x3f8 0xe00000012fe112e0: at __rw_wlock_hard+0x438 0xe00000012fe113d0: at vm_fault+0xa1c 0xe00000012fe11620: at vm_fault_trap+0x8c 0xe00000012fe11680: at trap+0x9a8 0xe00000012fe11790: at powerpc_interrupt+0x1a0 0xe00000012fe117e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012fe11810 0xc000200062224000 (tid 105227, pid 95387, "cc") KDB: stack backtrace of thread 105227: 0xe00000012c250230: at mi_switch+0x144 0xe00000012c250270: at turnstile_wait+0x3f8 0xe00000012c2502e0: at __rw_wlock_hard+0x438 0xe00000012c2503d0: at vm_fault+0xa1c 0xe00000012c250620: at vm_fault_trap+0x8c 0xe00000012c250680: at trap+0x9a8 0xe00000012c250790: at powerpc_interrupt+0x1a0 0xe00000012c2507e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012c250810 0xc00020000cabb560 (tid 104898, pid 95384, "cc") KDB: stack backtrace of thread 104898: 0xe000000121d35230: at mi_switch+0x144 0xe000000121d35270: at turnstile_wait+0x3f8 0xe000000121d352e0: at __rw_wlock_hard+0x438 0xe000000121d353d0: at vm_fault+0xa1c 0xe000000121d35620: at vm_fault_trap+0x8c 0xe000000121d35680: at trap+0x9a8 0xe000000121d35790: at powerpc_interrupt+0x1a0 0xe000000121d357e0: user DSI write trap @ 0x14d18610 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000121d35810 0xc000000072875560 (tid 104965, pid 95381, "cc") KDB: stack backtrace of thread 104965: 0xe0000001217aa230: at mi_switch+0x144 0xe0000001217aa270: at turnstile_wait+0x3f8 0xe0000001217aa2e0: at __rw_wlock_hard+0x438 0xe0000001217aa3d0: at vm_fault+0xa1c 0xe0000001217aa620: at vm_fault_trap+0x8c 0xe0000001217aa680: at trap+0x9a8 0xe0000001217aa790: at powerpc_interrupt+0x1a0 0xe0000001217aa7e0: user DSI write trap @ 0x14b8bff8 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001217aa810 0xc00020000d715560 (tid 104786, pid 95386, "cc") KDB: stack backtrace of thread 104786: 0xe000000122911230: at mi_switch+0x144 0xe000000122911270: at turnstile_wait+0x3f8 0xe0000001229112e0: at __rw_wlock_hard+0x438 0xe0000001229113d0: at vm_fault+0xa1c 0xe000000122911620: at vm_fault_trap+0x8c 0xe000000122911680: at trap+0x9a8 0xe000000122911790: at powerpc_interrupt+0x1a0 0xe0000001229117e0: user DSI write trap @ 0x14c95c20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000122911810 0xc00020001d146560 (tid 104602, pid 95388, "cc") KDB: stack backtrace of thread 104602: 0xe0000001106fc230: at mi_switch+0x144 0xe0000001106fc270: at turnstile_wait+0x3f8 0xe0000001106fc2e0: at __rw_wlock_hard+0x438 0xe0000001106fc3d0: at vm_fault+0xa1c 0xe0000001106fc620: at vm_fault_trap+0x8c 0xe0000001106fc680: at trap+0x9a8 0xe0000001106fc790: at powerpc_interrupt+0x1a0 0xe0000001106fc7e0: user DSI write trap @ 0x14c96568 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001106fc810 0xc00000009c767560 (tid 104754, pid 95391, "cc") KDB: stack backtrace of thread 104754: 0xe000000122fe0230: at mi_switch+0x144 0xe000000122fe0270: at turnstile_wait+0x3f8 0xe000000122fe02e0: at __rw_wlock_hard+0x438 0xe000000122fe03d0: at vm_fault+0xa1c 0xe000000122fe0620: at vm_fault_trap+0x8c 0xe000000122fe0680: at trap+0x9a8 0xe000000122fe0790: at powerpc_interrupt+0x1a0 0xe000000122fe07e0: user DSI write trap @ 0x1505e538 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa790 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000122fe0810 0xc00020002ded4000 (tid 104668, pid 95389, "cc") KDB: stack backtrace of thread 104668: 0xe0000001235bc230: at mi_switch+0x144 0xe0000001235bc270: at turnstile_wait+0x3f8 0xe0000001235bc2e0: at __rw_wlock_hard+0x438 0xe0000001235bc3d0: at vm_fault+0xa1c 0xe0000001235bc620: at vm_fault_trap+0x8c 0xe0000001235bc680: at trap+0x9a8 0xe0000001235bc790: at powerpc_interrupt+0x1a0 0xe0000001235bc7e0: user DSI write trap @ 0x1505d008 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001235bc810 0xc000200078d05000 (tid 105577, pid 95383, "cc") KDB: stack backtrace of thread 105577: 0xe00000012fe59230: at mi_switch+0x144 0xe00000012fe59270: at turnstile_wait+0x3f8 0xe00000012fe592e0: at __rw_wlock_hard+0x438 0xe00000012fe593d0: at vm_fault+0xa1c 0xe00000012fe59620: at vm_fault_trap+0x8c 0xe00000012fe59680: at trap+0x9a8 0xe00000012fe59790: at powerpc_interrupt+0x1a0 0xe00000012fe597e0: user DSI write trap @ 0x14f73e28 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012fe59810 0xc0000000500cd560 (tid 104945, pid 95392, "cc") KDB: stack backtrace of thread 104945: 0xe000000121ae9230: at mi_switch+0x144 0xe000000121ae9270: at turnstile_wait+0x3f8 0xe000000121ae92e0: at __rw_wlock_hard+0x438 0xe000000121ae93d0: at vm_fault+0xa1c 0xe000000121ae9620: at vm_fault_trap+0x8c 0xe000000121ae9680: at trap+0x9a8 0xe000000121ae9790: at powerpc_interrupt+0x1a0 0xe000000121ae97e0: user DSI write trap @ 0x1505a000 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7b0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000121ae9810 0xc000200011dea560 (tid 104956, pid 95394, "cc") KDB: stack backtrace of thread 104956: 0xe000000121759230: at mi_switch+0x144 0xe000000121759270: at turnstile_wait+0x3f8 0xe0000001217592e0: at __rw_wlock_hard+0x438 0xe0000001217593d0: at vm_fault+0xa1c 0xe000000121759620: at vm_fault_trap+0x8c 0xe000000121759680: at trap+0x9a8 0xe000000121759790: at powerpc_interrupt+0x1a0 0xe0000001217597e0: user DSI write trap @ 0x15051710 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa790 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000121759810 0xc00020000dfe5560 (tid 104845, pid 95380, "cc") KDB: stack backtrace of thread 104845: 0xe00000012233e230: at mi_switch+0x144 0xe00000012233e270: at turnstile_wait+0x3f8 0xe00000012233e2e0: at __rw_wlock_hard+0x438 0xe00000012233e3d0: at vm_fault+0xa1c 0xe00000012233e620: at vm_fault_trap+0x8c 0xe00000012233e680: at trap+0x9a8 0xe00000012233e790: at powerpc_interrupt+0x1a0 0xe00000012233e7e0: user DSI write trap @ 0x14be6a20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012233e810 0xc00020001caed560 (tid 104656, pid 95382, "cc") KDB: stack backtrace of thread 104656: 0xe0000001235aa230: at mi_switch+0x144 0xe0000001235aa270: at turnstile_wait+0x3f8 0xe0000001235aa2e0: at __rw_wlock_hard+0x438 0xe0000001235aa3d0: at vm_fault+0xa1c 0xe0000001235aa620: at vm_fault_trap+0x8c 0xe0000001235aa680: at trap+0x9a8 0xe0000001235aa790: at powerpc_interrupt+0x1a0 0xe0000001235aa7e0: user DSI write trap @ 0x14be6a20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7a0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001235aa810 0xc0002000a1851560 (tid 105223, pid 95396, "cc") KDB: stack backtrace of thread 105223: 0xe00000012c22c230: at mi_switch+0x144 0xe00000012c22c270: at turnstile_wait+0x3f8 0xe00000012c22c2e0: at __rw_wlock_hard+0x438 0xe00000012c22c3d0: at vm_fault+0xa1c 0xe00000012c22c620: at vm_fault_trap+0x8c 0xe00000012c22c680: at trap+0x9a8 0xe00000012c22c790: at powerpc_interrupt+0x1a0 0xe00000012c22c7e0: user DSI write trap @ 0x14c96568 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7d0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012c22c810 0xc000200112601000 (tid 106073, pid 95390, "cc") KDB: stack backtrace of thread 106073: 0xe00000012b3a1230: at mi_switch+0x144 0xe00000012b3a1270: at turnstile_wait+0x3f8 0xe00000012b3a12e0: at __rw_wlock_hard+0x438 0xe00000012b3a13d0: at vm_fault+0xa1c 0xe00000012b3a1620: at vm_fault_trap+0x8c 0xe00000012b3a1680: at trap+0x9a8 0xe00000012b3a1790: at powerpc_interrupt+0x1a0 0xe00000012b3a17e0: user DSI write trap @ 0x14c95c20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa7b0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012b3a1810 0xc00020011887b000 (tid 105868, pid 95330, "cc") KDB: stack backtrace of thread 105868: 0xe00000012dd1a230: at mi_switch+0x144 0xe00000012dd1a270: at turnstile_wait+0x3f8 0xe00000012dd1a2e0: at __rw_wlock_hard+0x438 0xe00000012dd1a3d0: at vm_fault+0xa1c 0xe00000012dd1a620: at vm_fault_trap+0x8c 0xe00000012dd1a680: at trap+0x9a8 0xe00000012dd1a790: at powerpc_interrupt+0x1a0 0xe00000012dd1a7e0: user DSI write trap @ 0x14c95c20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa400 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012dd1a810 0xc00020000e454560 (tid 104617, pid 95353, "cc") KDB: stack backtrace of thread 104617: 0xe00000010e2fc230: at mi_switch+0x144 0xe00000010e2fc270: at turnstile_wait+0x3f8 0xe00000010e2fc2e0: at __rw_wlock_hard+0x438 0xe00000010e2fc3d0: at vm_fault+0xa1c 0xe00000010e2fc620: at vm_fault_trap+0x8c 0xe00000010e2fc680: at trap+0x9a8 0xe00000010e2fc790: at powerpc_interrupt+0x1a0 0xe00000010e2fc7e0: user DSI write trap @ 0x14b902e0 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000010e2fc810 0xc00000004b127000 (tid 104609, pid 95377, "cc") KDB: stack backtrace of thread 104609: 0xe0000001043b9230: at mi_switch+0x144 0xe0000001043b9270: at turnstile_wait+0x3f8 0xe0000001043b92e0: at __rw_wlock_hard+0x438 0xe0000001043b93d0: at vm_fault+0xa1c 0xe0000001043b9620: at vm_fault_trap+0x8c 0xe0000001043b9680: at trap+0x9a8 0xe0000001043b9790: at powerpc_interrupt+0x1a0 0xe0000001043b97e0: user DSI write trap @ 0x14b902e0 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa3e0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001043b9810 0xc000000070edc560 (tid 104991, pid 95345, "cc") KDB: stack backtrace of thread 104991: 0xe0000001214a1230: at mi_switch+0x144 0xe0000001214a1270: at turnstile_wait+0x3f8 0xe0000001214a12e0: at __rw_wlock_hard+0x438 0xe0000001214a13d0: at vm_fault+0xa1c 0xe0000001214a1620: at vm_fault_trap+0x8c 0xe0000001214a1680: at trap+0x9a8 0xe0000001214a1790: at powerpc_interrupt+0x1a0 0xe0000001214a17e0: user DSI write trap @ 0x14b8ee58 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001214a1810 0xc00000005008b560 (tid 105538, pid 95334, "cc") KDB: stack backtrace of thread 105538: 0xe0000001304e0230: at mi_switch+0x144 0xe0000001304e0270: at turnstile_wait+0x3f8 0xe0000001304e02e0: at __rw_wlock_hard+0x438 0xe0000001304e03d0: at vm_fault+0xa1c 0xe0000001304e0620: at vm_fault_trap+0x8c 0xe0000001304e0680: at trap+0x9a8 0xe0000001304e0790: at powerpc_interrupt+0x1a0 0xe0000001304e07e0: user DSI write trap @ 0x14b87078 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001304e0810 0xc000200012807560 (tid 104441, pid 95343, "cc") KDB: stack backtrace of thread 104441: 0xe0000001163fc230: at mi_switch+0x144 0xe0000001163fc270: at turnstile_wait+0x3f8 0xe0000001163fc2e0: at __rw_wlock_hard+0x438 0xe0000001163fc3d0: at vm_fault+0xa1c 0xe0000001163fc620: at vm_fault_trap+0x8c 0xe0000001163fc680: at trap+0x9a8 0xe0000001163fc790: at powerpc_interrupt+0x1a0 0xe0000001163fc7e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa3d0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001163fc810 0xc00020000a2fb560 (tid 104967, pid 95367, "cc") KDB: stack backtrace of thread 104967: 0xe0000001217bc230: at mi_switch+0x144 0xe0000001217bc270: at turnstile_wait+0x3f8 0xe0000001217bc2e0: at __rw_wlock_hard+0x438 0xe0000001217bc3d0: at vm_fault+0xa1c 0xe0000001217bc620: at vm_fault_trap+0x8c 0xe0000001217bc680: at trap+0x9a8 0xe0000001217bc790: at powerpc_interrupt+0x1a0 0xe0000001217bc7e0: user DSI write trap @ 0x14b8c010 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001217bc810 0xc0002000a3dd9560 (tid 105298, pid 95341, "cc") KDB: stack backtrace of thread 105298: 0xe00000012d1c5230: at mi_switch+0x144 0xe00000012d1c5270: at turnstile_wait+0x3f8 0xe00000012d1c52e0: at __rw_wlock_hard+0x438 0xe00000012d1c53d0: at vm_fault+0xa1c 0xe00000012d1c5620: at vm_fault_trap+0x8c 0xe00000012d1c5680: at trap+0x9a8 0xe00000012d1c5790: at powerpc_interrupt+0x1a0 0xe00000012d1c57e0: user DSI write trap @ 0x15058550 by 0x8150b0848: srr1=0x900000000000d032 r1=0x3fffffffffffa480 cr=0x28200000 xer=0 ctr=0x8150b0828 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012d1c5810 0xc00020000d5a7560 (tid 102441, pid 95327, "cc") KDB: stack backtrace of thread 102441: 0xe000000106dfc230: at mi_switch+0x144 0xe000000106dfc270: at turnstile_wait+0x3f8 0xe000000106dfc2e0: at __rw_wlock_hard+0x438 0xe000000106dfc3d0: at vm_fault+0xa1c 0xe000000106dfc620: at vm_fault_trap+0x8c 0xe000000106dfc680: at trap+0x9a8 0xe000000106dfc790: at powerpc_interrupt+0x1a0 0xe000000106dfc7e0: user DSI write trap @ 0x1505b010 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000106dfc810 0xc000200011c2e000 (tid 104854, pid 95344, "cc") KDB: stack backtrace of thread 104854: 0xe00000012238f230: at mi_switch+0x144 0xe00000012238f270: at turnstile_wait+0x3f8 0xe00000012238f2e0: at __rw_wlock_hard+0x438 0xe00000012238f3d0: at vm_fault+0xa1c 0xe00000012238f620: at vm_fault_trap+0x8c 0xe00000012238f680: at trap+0x9a8 0xe00000012238f790: at powerpc_interrupt+0x1a0 0xe00000012238f7e0: user DSI write trap @ 0x14b87078 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012238f810 0xc00020000e721000 (tid 104445, pid 95331, "cc") KDB: stack backtrace of thread 104445: 0xe000000115dfc230: at mi_switch+0x144 0xe000000115dfc270: at turnstile_wait+0x3f8 0xe000000115dfc2e0: at __rw_wlock_hard+0x438 0xe000000115dfc3d0: at vm_fault+0xa1c 0xe000000115dfc620: at vm_fault_trap+0x8c 0xe000000115dfc680: at trap+0x9a8 0xe000000115dfc790: at powerpc_interrupt+0x1a0 0xe000000115dfc7e0: user DSI write trap @ 0x15067060 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000115dfc810 0xc0000000728cd000 (tid 104578, pid 95348, "cc") KDB: stack backtrace of thread 104578: 0xe0000001046ca230: at mi_switch+0x144 0xe0000001046ca270: at turnstile_wait+0x3f8 0xe0000001046ca2e0: at __rw_wlock_hard+0x438 0xe0000001046ca3d0: at vm_fault+0xa1c 0xe0000001046ca620: at vm_fault_trap+0x8c 0xe0000001046ca680: at trap+0x9a8 0xe0000001046ca790: at powerpc_interrupt+0x1a0 0xe0000001046ca7e0: user DSI write trap @ 0x14b902e0 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa400 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001046ca810 0xc0002000ffc23560 (tid 105835, pid 95342, "cc") KDB: stack backtrace of thread 105835: 0xe00000012e3e0230: at mi_switch+0x144 0xe00000012e3e0270: at turnstile_wait+0x3f8 0xe00000012e3e02e0: at __rw_wlock_hard+0x438 0xe00000012e3e03d0: at vm_fault+0xa1c 0xe00000012e3e0620: at vm_fault_trap+0x8c 0xe00000012e3e0680: at trap+0x9a8 0xe00000012e3e0790: at powerpc_interrupt+0x1a0 0xe00000012e3e07e0: user DSI write trap @ 0x14c95c20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012e3e0810 0xc000200117f2b560 (tid 105758, pid 95336, "cc") KDB: stack backtrace of thread 105758: 0xe00000012e911230: at mi_switch+0x144 0xe00000012e911270: at turnstile_wait+0x3f8 0xe00000012e9112e0: at __rw_wlock_hard+0x438 0xe00000012e9113d0: at vm_fault+0xa1c 0xe00000012e911620: at vm_fault_trap+0x8c 0xe00000012e911680: at trap+0x9a8 0xe00000012e911790: at powerpc_interrupt+0x1a0 0xe00000012e9117e0: user DSI write trap @ 0x14b88418 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012e911810 0xc0000000502b9000 (tid 104527, pid 95355, "cc") KDB: stack backtrace of thread 104527: 0xe00000010053e230: at mi_switch+0x144 0xe00000010053e270: at turnstile_wait+0x3f8 0xe00000010053e2e0: at __rw_wlock_hard+0x438 0xe00000010053e3d0: at vm_fault+0xa1c 0xe00000010053e620: at vm_fault_trap+0x8c 0xe00000010053e680: at trap+0x9a8 0xe00000010053e790: at powerpc_interrupt+0x1a0 0xe00000010053e7e0: user DSI write trap @ 0x14f73e28 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000010053e810 0xc00000005016c000 (tid 105351, pid 95359, "cc") KDB: stack backtrace of thread 105351: 0xe00000012cbbc230: at mi_switch+0x144 0xe00000012cbbc270: at turnstile_wait+0x3f8 0xe00000012cbbc2e0: at __rw_wlock_hard+0x438 0xe00000012cbbc3d0: at vm_fault+0xa1c 0xe00000012cbbc620: at vm_fault_trap+0x8c 0xe00000012cbbc680: at trap+0x9a8 0xe00000012cbbc790: at powerpc_interrupt+0x1a0 0xe00000012cbbc7e0: user DSI write trap @ 0x14b8c010 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012cbbc810 0xc0000000500bc000 (tid 104809, pid 95372, "cc") KDB: stack backtrace of thread 104809: 0xe0000001229dfce0: at mi_switch+0x144 0xe0000001229dfd20: at turnstile_wait+0x3f8 0xe0000001229dfd90: at __rw_wlock_hard+0x438 0xe0000001229dfe80: at vm_imgact_map_page+0x160 0xe0000001229dfee0: at elf64_load_sections+0x20c 0xe0000001229dffe0: at exec_elf64_imgact+0xd60 0xe0000001229e0180: at kern_execve+0x6a4 0xe0000001229e05e0: at sys_execve+0x7c 0xe0000001229e0680: at trap+0xdc4 0xe0000001229e0790: at powerpc_interrupt+0x1a0 0xe0000001229e07e0: user SC trap by 0x8155b3fa0: srr1=0x900000000200f032 r1=0x3fffffffffff9760 cr=0x424802c2 xer=0 ctr=0x8155b3f90 r2=0x81568a548 frame=0xe0000001229e0810 0xc0000002375ac560 (tid 106063, pid 95366, "cc") KDB: stack backtrace of thread 106063: 0xe00000012b347230: at mi_switch+0x144 0xe00000012b347270: at turnstile_wait+0x3f8 0xe00000012b3472e0: at __rw_wlock_hard+0x438 0xe00000012b3473d0: at vm_fault+0xa1c 0xe00000012b347620: at vm_fault_trap+0x8c 0xe00000012b347680: at trap+0x9a8 0xe00000012b347790: at powerpc_interrupt+0x1a0 0xe00000012b3477e0: user DSI write trap @ 0x14b902e0 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000012b347810 0xc0000000500ad000 (tid 105466, pid 95357, "cc") KDB: stack backtrace of thread 105466: 0xe000000130a3e230: at mi_switch+0x144 0xe000000130a3e270: at turnstile_wait+0x3f8 0xe000000130a3e2e0: at __rw_wlock_hard+0x438 0xe000000130a3e3d0: at vm_fault+0xa1c 0xe000000130a3e620: at vm_fault_trap+0x8c 0xe000000130a3e680: at trap+0x9a8 0xe000000130a3e790: at powerpc_interrupt+0x1a0 0xe000000130a3e7e0: user DSI write trap @ 0x14b8ae28 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe000000130a3e810 0xc00020001cb0b560 (tid 103217, pid 95328, "cc") KDB: stack backtrace of thread 103217: 0xe0000001017e0230: at mi_switch+0x144 0xe0000001017e0270: at turnstile_wait+0x3f8 0xe0000001017e02e0: at __rw_wlock_hard+0x438 0xe0000001017e03d0: at vm_fault+0xa1c 0xe0000001017e0620: at vm_fault_trap+0x8c 0xe0000001017e0680: at trap+0x9a8 0xe0000001017e0790: at powerpc_interrupt+0x1a0 0xe0000001017e07e0: user DSI write trap @ 0x1505b010 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa3f0 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001017e0810 0xc00000025de1a560 (tid 102417, pid 95376, "cc") KDB: stack backtrace of thread 102417: 0xe0000001337fc230: at mi_switch+0x144 0xe0000001337fc270: at turnstile_wait+0x3f8 0xe0000001337fc2e0: at __rw_wlock_hard+0x438 0xe0000001337fc3d0: at vm_fault+0xa1c 0xe0000001337fc620: at vm_fault_trap+0x8c 0xe0000001337fc680: at trap+0x9a8 0xe0000001337fc790: at powerpc_interrupt+0x1a0 0xe0000001337fc7e0: user DSI write trap @ 0x14be6a20 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa400 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001337fc810 0xc000200012c7c000 (tid 104672, pid 95335, "cc") KDB: stack backtrace of thread 104672: 0xe0000001235d7230: at mi_switch+0x144 0xe0000001235d7270: at turnstile_wait+0x3f8 0xe0000001235d72e0: at __rw_wlock_hard+0x438 0xe0000001235d73d0: at vm_fault+0xa1c 0xe0000001235d7620: at vm_fault_trap+0x8c 0xe0000001235d7680: at trap+0x9a8 0xe0000001235d7790: at powerpc_interrupt+0x1a0 0xe0000001235d77e0: user DSI write trap @ 0x14b87078 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe0000001235d7810 0xc00020000e503000 (tid 104530, pid 95354, "cc") KDB: stack backtrace of thread 104530: 0xe00000011a2fc230: at mi_switch+0x144 0xe00000011a2fc270: at turnstile_wait+0x3f8 0xe00000011a2fc2e0: at __rw_wlock_hard+0x438 0xe00000011a2fc3d0: at vm_fault+0xa1c 0xe00000011a2fc620: at vm_fault_trap+0x8c 0xe00000011a2fc680: at trap+0x9a8 0xe00000011a2fc790: at powerpc_interrupt+0x1a0 0xe00000011a2fc7e0: user DSI write trap @ 0x14f71f48 by 0x8150a85b4: srr1=0x900000000200d032 r1=0x3fffffffffffa410 cr=0x82200800 xer=0 ctr=0x8150a86c0 r2=0x8150d9f68 sr=0xa000000 frame=0xe00000011a2fc810 Pending Threads: empty db> cont