uvm_fault(0xffffffff838d7230, 0xffff8000015fb000, 0, 1) -> e kernel: page fault trap, code=0 Stopped at memcpy+0x19: repe movsq (%rsi),%es:(%rdi) TID PID UID PRFLAGS PFLAGS CPU COMMAND *188745 86736 0 0 0x4000000 0 syz-executor memcpy() at memcpy+0x19 rtm_msg1(14,ffff8000361370d8) at rtm_msg1+0x306 sys/net/rtsock.c:1627 rtm_addr(14,ffff8000015faf00) at rtm_addr+0xb9 sys/net/rtsock.c:-1 in6_update_ifa(ffff800000c17800,ffff8000361374f0,ffff8000015faf00) at in6_update_ifa+0x199a sys/netinet6/in6.c:741 in6_ioctl_change_ifaddr(8080691a,ffff8000361374f0,ffff800000c17800) at in6_ioctl_change_ifaddr+0x638 sys/netinet6/in6.c:352 ifioctl(ffff8000015eb230,8080691a,ffff8000361374f0,ffff80002a833258) at ifioctl+0x1682 pru_control sys/sys/protosw.h:353 [inline] ifioctl(ffff8000015eb230,8080691a,ffff8000361374f0,ffff80002a833258) at ifioctl+0x1682 sys/net/if.c:2480 sys_ioctl(ffff80002a833258,ffff8000361376c0,ffff800036137610) at sys_ioctl+0x660 sys/kern/sys_generic.c:-1 syscall(ffff8000361376c0) at syscall+0x962 mi_syscall sys/sys/syscall_mi.h:-1 [inline] syscall(ffff8000361376c0) at syscall+0x962 sys/arch/amd64/amd64/trap.c:765 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x2a60e361220, count: 6 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.