panic: attempt to execute user address 0x0 in supervisor mode
Stopped at      db_enter+0x18:  addq    $0x8,%rsp
    TID    PID    UID     PRFLAGS     PFLAGS  CPU  COMMAND
 288816  46409      0           0          0    0  syz-executor.0
* 28674  46409      0           0  0x4000000    1K syz-executor.0
db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398
panic() at panic+0x15c sys/kern/subr_prf.c:207
pageflttrap() at pageflttrap+0x40b
kerntrap(ffff800023d79170) at kerntrap+0xec sys/arch/amd64/amd64/trap.c:287
alltraps_kern_meltdown(6,ffff800022d74000,fffffd807a1a7548,10,ffff80000005b5b0,ffff800023d793d8) at alltraps_kern_meltdown+0x7b
0(b,ffff800023d79338,83,ffff800023d793d8,0,b) at 0
rt_clone(ffff800023d79448,fffffd806f6c6c88,0) at rt_clone+0x78 sys/net/route.c:266
rtalloc_mpath(fffffd806f6c6c88,0,0) at rtalloc_mpath+0xba rt_match sys/net/route.c:244 [inline]
rtalloc_mpath(fffffd806f6c6c88,0,0) at rtalloc_mpath+0xba sys/net/route.c:359
in_pcbselsrc(ffff800023d79520,fffffd8065001820,fffffd806f6c6c08) at in_pcbselsrc+0x219 sys/netinet/in_pcb.c:934
in_pcbconnect(fffffd806f6c6c08,fffffd8065001800) at in_pcbconnect+0x107 sys/netinet/in_pcb.c:492
udp_usrreq(fffffd8062405dc8,4,0,fffffd8065001800,0,ffff800020ace788) at udp_usrreq+0x560
sys_connect(ffff800020ace788,ffff800023d796a8,ffff800023d796f0) at sys_connect+0x3df sys/kern/uipc_syscalls.c:388
syscall(ffff800023d79770) at syscall+0x4a4 mi_syscall sys/sys/syscall_mi.h:92 [inline]
syscall(ffff800023d79770) at syscall+0x4a4 sys/arch/amd64/amd64/trap.c:555
Xsyscall(6,0,fffffffffffffed2,0,3,1184893a010) at Xsyscall+0x128
end of kernel
end trace frame: 0x11b3dad17e0, count: 1
https://www.openbsd.org/ddb.html describes the minimum info required in bug
reports.  Insufficient info makes it difficult to find and fix bugs.