uvm_fault(0xffffffff8391b9b0, 0xffff80000175a000, 0, 1) -> e kernel: page fault trap, code=0 Stopped at memcpy+0x19: repe movsq (%rsi),%es:(%rdi) TID PID UID PRFLAGS PFLAGS CPU COMMAND *155540 66057 0 0 0x4000000 1K syz-executor 163925 15052 0 0x100002 0x1 0 arp memcpy() at memcpy+0x19 rtm_msg1(14,ffff800038800f28) at rtm_msg1+0x306 sys/net/rtsock.c:1627 rtm_addr(14,ffff800001759f00) at rtm_addr+0xb9 sys/net/rtsock.c:-1 in6_update_ifa(ffff800000c02800,ffff800038801340,ffff800001759f00) at in6_update_ifa+0x199a sys/netinet6/in6.c:741 in6_ioctl_change_ifaddr(8080691a,ffff800038801340,ffff800000c02800) at in6_ioctl_change_ifaddr+0x64e sys/netinet6/in6.c:352 ifioctl(ffff8000017b6f30,8080691a,ffff800038801340,ffff800031004d38) at ifioctl+0x16d2 pru_control sys/sys/protosw.h:353 [inline] ifioctl(ffff8000017b6f30,8080691a,ffff800038801340,ffff800031004d38) at ifioctl+0x16d2 sys/net/if.c:2480 sys_ioctl(ffff800031004d38,ffff800038801520,ffff800038801470) at sys_ioctl+0x674 sys/kern/sys_generic.c:-1 syscall(ffff800038801520) at syscall+0xbd4 mi_syscall sys/sys/syscall_mi.h:176 [inline] syscall(ffff800038801520) at syscall+0xbd4 sys/arch/amd64/amd64/trap.c:765 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0xb5a3a369c0, count: 6 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.