Recently upgraded to netbsd-8 branch, and I'm still seeing these occassionally. Eg:
Sep 25 20:57:16 slave /netbsd: fatal page fault in supervisor mode Sep 25 20:57:16 slave /netbsd: trap type 6 code 0 rip 0xffffffff807a68b9 cs 0x8 rflags 0x10286 cr2 0x8 ilevel 0x8 rsp 0xfffffe80400077e0 Sep 25 20:57:16 slave /netbsd: curlwp 0xfffffe811f932420 pid 0.3 lowest kstack 0xfffffe80400042c0 Sep 25 20:57:16 slave /netbsd: panic: trap Sep 25 20:57:16 slave /netbsd: cpu0: Begin traceback... Sep 25 20:57:16 slave /netbsd: vpanic() at netbsd:vpanic+0x140 Sep 25 20:57:16 slave /netbsd: snprintf() at netbsd:snprintf Sep 25 20:57:16 slave /netbsd: trap() at netbsd:trap+0xc6b Sep 25 20:57:16 slave /netbsd: --- trap (number 6) --- Sep 25 20:57:16 slave /netbsd: rmc_queue_packet() at netbsd:rmc_queue_packet+0x150 Sep 25 20:57:16 slave /netbsd: cbq_enqueue() at netbsd:cbq_enqueue+0xee Sep 25 20:57:16 slave /netbsd: ifq_enqueue2() at netbsd:ifq_enqueue2+0xc4 Sep 25 20:57:16 slave /netbsd: sppp_output() at netbsd:sppp_output+0x1ab Sep 25 20:57:16 slave /netbsd: ip6_if_output() at netbsd:ip6_if_output+0x60 Sep 25 20:57:16 slave /netbsd: ipf_fastroute() at netbsd:ipf_fastroute+0x97e Sep 25 20:57:16 slave /netbsd: ipf_send_ip() at netbsd:ipf_send_ip+0x13d Sep 25 20:57:16 slave /netbsd: ipf_check() at netbsd:ipf_check+0xcfc Sep 25 20:57:16 slave /netbsd: pfil_run_hooks() at netbsd:pfil_run_hooks+0x117 Sep 25 20:57:16 slave /netbsd: ip6_input() at netbsd:ip6_input+0x278 Sep 25 20:57:16 slave /netbsd: ip6intr() at netbsd:ip6intr+0x71 Sep 25 20:57:16 slave /netbsd: softint_dispatch() at netbsd:softint_dispatch+0xd3 Sep 25 20:57:16 slave /netbsd: DDB lost frame for netbsd:Xsoftintr+0x4f, trying 0xfffffe8040007ff0 Sep 25 20:57:16 slave /netbsd: Xsoftintr() at netbsd:Xsoftintr+0x4f Are there many users of altq+ipf out there? Perhaps now is a good time to switch to npf... -- Paul Ripke "Great minds discuss ideas, average minds discuss events, small minds discuss people." -- Disputed: Often attributed to Eleanor Roosevelt. 1948.
