uvm_fault(0xffffffff83844320, 0xffff8000014f0000, 0, 1) -> e kernel: page fault trap, code=0 Stopped at memcpy+0x19: repe movsq (%rsi),%es:(%rdi) TID PID UID PRFLAGS PFLAGS CPU COMMAND *518220 47495 0 0 0x4000000 0 syz-executor memcpy() at memcpy+0x19 rtm_msg1(14,ffff80003c97d808) at rtm_msg1+0x306 sys/net/rtsock.c:1627 rtm_addr(14,ffff8000014eff00) at rtm_addr+0xb9 sys/net/rtsock.c:-1 in6_update_ifa(ffff800000b12800,ffff80003c97dc20,ffff8000014eff00) at in6_update_ifa+0x199a sys/netinet6/in6.c:741 in6_ioctl_change_ifaddr(8080691a,ffff80003c97dc20,ffff800000b12800) at in6_ioctl_change_ifaddr+0x638 sys/netinet6/in6.c:352 ifioctl(ffff80000147d9f0,8080691a,ffff80003c97dc20,ffff80003c996fb8) at ifioctl+0x1515 pru_control sys/sys/protosw.h:352 [inline] ifioctl(ffff80000147d9f0,8080691a,ffff80003c97dc20,ffff80003c996fb8) at ifioctl+0x1515 sys/net/if.c:2454 sys_ioctl(ffff80003c996fb8,ffff80003c97ddf0,ffff80003c97dd40) at sys_ioctl+0x660 sys/kern/sys_generic.c:-1 syscall(ffff80003c97ddf0) at syscall+0x962 mi_syscall sys/sys/syscall_mi.h:-1 [inline] syscall(ffff80003c97ddf0) at syscall+0x962 sys/arch/amd64/amd64/trap.c:748 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x80e41894840, count: 6 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.