uvm_fault(0xffffffff83a01ef0, 0xffff80000177a00a, 0, 1) -> e kernel: page fault trap, code=0 Stopped at arp_rtrequest+0x6a4: movzwl 0xc(%rcx,%rbx,1),%ecx TID PID UID PRFLAGS PFLAGS CPU COMMAND *134212 98257 0 0 0x4000000 0 syz-executor arp_rtrequest(ffff8000002a2058,1,fffffd806c8d41b8) at arp_rtrequest+0x6a4 arprequest sys/netinet/if_ether.c:325 [inline] arp_rtrequest(ffff8000002a2058,1,fffffd806c8d41b8) at arp_rtrequest+0x6a4 sys/netinet/if_ether.c:226 rtrequest(1,ffff80003a8eae80,0,ffff80003a8eadf0,16) at rtrequest+0xdc1 sys/net/route.c:1114 rtm_output(ffff8000016e6a00,ffff80003a8eaf28,ffff80003a8eae80,0,16) at rtm_output+0x91a sys/net/rtsock.c:953 route_output(fffffd8074976f00,ffff800010fdecf8) at route_output+0xa2b sys/net/rtsock.c:858 route_send(ffff800010fdecf8,fffffd8074976f00,0,0) at route_send+0xd7 sys/net/rtsock.c:322 sosend(ffff800010fdecf8,0,ffff80003a8eb0d8,0,0,808) at sosend+0x804 sys/kern/uipc_socket.c:-1 sendit(ffff80003c8ff4e8,4,ffff80003a8eb1d0,808,ffff80003a8eb270) at sendit+0x5a5 sys/kern/uipc_syscalls.c:785 sys_sendto(ffff80003c8ff4e8,ffff80003a8eb320,ffff80003a8eb270) at sys_sendto+0x8d sys/kern/uipc_syscalls.c:563 syscall(ffff80003a8eb320) at syscall+0x962 mi_syscall sys/sys/syscall_mi.h:-1 [inline] syscall(ffff80003a8eb320) at syscall+0x962 sys/arch/amd64/amd64/trap.c:783 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x3ae53cb77b0, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb>