panic: attempt to execute user address 0x0 in supervisor mode Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *430447 25311 0 0 0x4000000 0 syz-executor.1 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398 panic() at panic+0x15c sys/kern/subr_prf.c:207 pageflttrap() at pageflttrap+0x3eb kerntrap(ffff800015957900) at kerntrap+0xdb sys/arch/amd64/amd64/trap.c:287 alltraps_kern_meltdown(6,ffff800015113000,fffffd8036d6abd0,10,ffff800000025500,ffff800015957b68) at alltraps_kern_meltdown+0x7b 0(b,ffff800015957ac8,83,ffff800015957b68,0,b) at 0 rt_match(ffff800000b30688,0,1,0) at rt_match+0xbe rt_clone sys/net/route.c:266 [inline] rt_match(ffff800000b30688,0,1,0) at rt_match+0xbe sys/net/route.c:242 ifa_ifwithroute(fe04c626,ffff800000b30660,ffff800000b30688,5) at ifa_ifwithroute+0x10d sys/net/rtsock.c:1176 rtm_getifa(ffff800015957d28,5) at rtm_getifa+0x1e3 rtm_output(ffff800000b30600,ffff800015957dd0,ffff800015957d28,1b,5) at rtm_output+0x5ce sys/net/rtsock.c:897 route_output(fffffd803759a800,fffffd802da64ab8,0,0) at route_output+0x609 sys/net/rtsock.c:819 route_usrreq(fffffd802da64ab8,9,fffffd803759a800,0,0,ffff8000ffff58c0) at route_usrreq+0x363 sys/net/rtsock.c:275 sosend(fffffd802da64ab8,0,ffff800015957fb0,0,0,80) at sosend+0x63d sys/kern/uipc_socket.c:524 sendit(ffff8000ffff58c0,4,ffff800015958090,0,ffff800015958170) at sendit+0x52b sys/kern/uipc_syscalls.c:662 end trace frame: 0xffff800015958110, count: 0 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.