First, let me start out by saying that I have hacked in Kame's NATPT functionality into this kernel, so it's entirely possible that is causing this, but I thought I'd ask anyway.
Here's a stack trace from this panic: (above this is the trap, savecore and reboot) #17 0xc018b973 in rn_match (v_arg=0xc904326c, head=0xc0f33f80) at ../../net/radix.c:240 #18 0xc0192b96 in in_matroute (v_arg=0xc904326c, head=0xc0f33f80) at ../../netinet/in_rmx.c:151 #19 0xc018cdd6 in rtalloc1 (dst=0xc904326c, report=1, ignflags=0) at ../../net/route.c:135 #20 0xc018cd90 in rtalloc_ign (ro=0xc9043268, ignore=0) at ../../net/route.c:111 #21 0xc018cd39 in rtalloc (ro=0xc9043268) at ../../net/route.c:91 #22 0xc01a2365 in tcp_rtlookup (inp=0xc9043220) at ../../netinet/tcp_subr.c:1349 #23 0xc01a23e6 in tcp_gettaocache (inp=0xc9043220) at ../../netinet/tcp_subr.c:1443 #24 0xc019e464 in tcp_input (m=0xc07b1200, off0=20, proto=6) at ../../netinet/tcp_input.c:1117 #25 0xc0199b6d in ip_input (m=0xc07b1200) at ../../netinet/ip_input.c:862 #26 0xc0193b3a in transmit_event (pipe=0xc0f61200) at ../../netinet/ip_dummynet.c:431 #27 0xc0193d2b in ready_event (q=0xc0f8b180) at ../../netinet/ip_dummynet.c:566 #28 0xc0194b43 in dummynet_io (pipe_nr=1, dir=2, m=0xc07b1200, ifp=0x0, ro=0x0, dst=0x0, rule=0xc0ebd970, flags=0) at ../../netinet/ip_dummynet.c:1137 #29 0xc019972b in ip_input (m=0xc07b1200) at ../../netinet/ip_input.c:465 #30 0xc0199bcb in ipintr () at ../../netinet/ip_input.c:890 net/radix.c line 240 is this: if (t->rn_bmask & cp[t->rn_offset]) The trap was caused by cp being set to NULL. Unfortunately, I can't quite wrap my head around the logic in this routine. The input parameters are not NULL, so cp must have got that way somewhere in the loop. To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-net" in the body of the message