panic: attempt to execute user address 0x0 in supervisor mode Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND 71377 7827 0 0 0 1 syz-executor.1 * 93168 7827 0 0 0x4000000 0K syz-executor.1 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398 panic() at panic+0x15c sys/kern/subr_prf.c:207 pageflttrap() at pageflttrap+0x40b kerntrap(ffff8000221a2a30) at kerntrap+0xec sys/arch/amd64/amd64/trap.c:287 alltraps_kern_meltdown(6,ffff800020b58000,fffffd8068b72b68,10,ffff80000005b5f0,ffff8000221a2c98) at alltraps_kern_meltdown+0x7b 0(b,ffff8000221a2bf8,83,ffff8000221a2c98,0,b) at 0 rt_clone(ffff8000221a2d08,fffffd8070b7d2c8,0) at rt_clone+0x78 sys/net/route.c:266 rtalloc_mpath(fffffd8070b7d2c8,0,0) at rtalloc_mpath+0xba rt_match sys/net/route.c:244 [inline] rtalloc_mpath(fffffd8070b7d2c8,0,0) at rtalloc_mpath+0xba sys/net/route.c:359 in_pcbselsrc(ffff8000221a2de0,fffffd806915ee20,fffffd8070b7d248) at in_pcbselsrc+0x219 sys/netinet/in_pcb.c:934 in_pcbconnect(fffffd8070b7d248,fffffd806915ee00) at in_pcbconnect+0x107 sys/netinet/in_pcb.c:492 udp_usrreq(fffffd806860b060,4,0,fffffd806915ee00,0,ffff800020ab1650) at udp_usrreq+0x560 sys_connect(ffff800020ab1650,ffff8000221a2f68,ffff8000221a2fb0) at sys_connect+0x3df sys/kern/uipc_syscalls.c:388 syscall(ffff8000221a3030) at syscall+0x4a4 mi_syscall sys/sys/syscall_mi.h:92 [inline] syscall(ffff8000221a3030) at syscall+0x4a4 sys/arch/amd64/amd64/trap.c:555 Xsyscall(6,0,fffffffffffffed2,0,3,52b3b42e010) at Xsyscall+0x128 end of kernel end trace frame: 0x52db5811680, count: 1 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.