It sounds very likely that an emulated instruction is the problem. The kernel pages containing the emulate code are mapped RO for user, and the emulate code will switch back to the User process after a trap and execute the emulate code as the user.Interesteing. So the next step would be gdb /netbsd (or if you have a netbsd.gdb variant preferably that) and x/i the pc value?Actually, the next step is dump the stack to find the exception frame. (gdb) x/32x $sp
(gdb) x/i 0x80196183 0x80196183 <emodd+120>: movd r9,r0 (gdb) x/32x $sp: No registers. ...?