./file0./file0./file0 êÏ-]Ñpanic: uvm_fault_unwire_locked: address not in map Stopped at db_enter+0x25: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND 242889 92022 0 0 0 0 syz-executor * 38119 98142 0 0 0x4000000 1K syz-executor db_enter() at db_enter+0x25 sys/arch/amd64/amd64/db_interface.c:437 panic(ffffffff830bdf78) at panic+0x1e5 sys/kern/subr_prf.c:198 uvm_fault_unwire_locked(fffffd806bc2f6e0,201a0000,201b0000) at uvm_fault_unwire_locked+0x487 sys/uvm/uvm_fault.c:1663 uvm_fault_wire(fffffd806bc2f6e0,201a0000,201b1000,3) at uvm_fault_wire+0x12d uvm_fault_unwire sys/uvm/uvm_fault.c:1623 [inline] uvm_fault_wire(fffffd806bc2f6e0,201a0000,201b1000,3) at uvm_fault_wire+0x12d sys/uvm/uvm_fault.c:1605 uvm_vslock_device(ffff8000ffff07c0,201a0040,10000,3,ffff80003726cc90) at uvm_vslock_device+0x112 sys/uvm/uvm_glue.c:170 physio(ffffffff820cff40,d02,8000,ffffffff820d07a0,ffff80003726cf48) at physio+0x277 sys/kern/kern_physio.c:139 spec_read(ffff80003726cdb0) at spec_read+0x155 sys/kern/spec_vnops.c:215 VOP_READ(fffffd8061f51bf8,ffff80003726cf48,0,fffffd807f7d3138) at VOP_READ+0x102 sys/kern/vfs_vops.c:227 vn_read(fffffd8061d87980,ffff80003726cf48,1) at vn_read+0x17b sys/kern/vfs_vnops.c:369 dofilereadv(ffff8000ffff07c0,3,ffff80003726cf48,1,ffff80003726d000) at dofilereadv+0x230 sys/kern/sys_generic.c:252 sys_pread(ffff8000ffff07c0,ffff80003726d0b0,ffff80003726d000) at sys_pread+0xae sys/kern/vfs_syscalls.c:3293 syscall(ffff80003726d0b0) at syscall+0xbb6 mi_syscall sys/sys/syscall_mi.h:179 [inline] syscall(ffff80003726d0b0) at syscall+0xbb6 sys/arch/amd64/amd64/trap.c:577 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x85d95bb810, count: 2 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.