uvm_fault(0xffffffff838e9870, 0xffff8000014b2000, 0, 1) -> e kernel: page fault trap, code=0 Stopped at memcpy+0x19: repe movsq (%rsi),%es:(%rdi) TID PID UID PRFLAGS PFLAGS CPU COMMAND *389966 55658 0 0 0x4000000 0K syz-executor 43431 84607 0 0 0 1 syz-executor memcpy() at memcpy+0x19 rtm_msg1(14,ffff80002a3bbf68) at rtm_msg1+0x306 sys/net/rtsock.c:1627 rtm_addr(14,ffff8000014b1f00) at rtm_addr+0xb9 sys/net/rtsock.c:-1 in6_update_ifa(ffff800000afd800,ffff80002a3bc380,ffff8000014b1f00) at in6_update_ifa+0x199a sys/netinet6/in6.c:741 in6_ioctl_change_ifaddr(8080691a,ffff80002a3bc380,ffff800000afd800) at in6_ioctl_change_ifaddr+0x64e sys/netinet6/in6.c:352 ifioctl(ffff800001429790,8080691a,ffff80002a3bc380,ffff800038bf2fc0) at ifioctl+0x156d pru_control sys/sys/protosw.h:352 [inline] ifioctl(ffff800001429790,8080691a,ffff80002a3bc380,ffff800038bf2fc0) at ifioctl+0x156d sys/net/if.c:2480 sys_ioctl(ffff800038bf2fc0,ffff80002a3bc560,ffff80002a3bc4b0) at sys_ioctl+0x674 sys/kern/sys_generic.c:-1 syscall(ffff80002a3bc560) at syscall+0xbd4 mi_syscall sys/sys/syscall_mi.h:176 [inline] syscall(ffff80002a3bc560) at syscall+0xbd4 sys/arch/amd64/amd64/trap.c:748 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0xfb0c9d19c10, count: 6 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.