vNO"'n+ *HV,X#./bus./buspanic: attempt to execute user address 0x0 in supervisor mode Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *320704 11375 0 0 0x4000000 0 syz-executor.1 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:398 panic() at panic+0x15c sys/kern/subr_prf.c:207 pageflttrap() at pageflttrap+0x3eb kerntrap(ffff80001594e360) at kerntrap+0xdb sys/arch/amd64/amd64/trap.c:287 alltraps_kern_meltdown(6,ffff80001550f000,fffffd802ec98698,10,ffff80000005b790,ffff80001594e5c8) at alltraps_kern_meltdown+0x7b 0(b,ffff80001594e528,83,ffff80001594e5c8,0,b) at 0 rt_match(fffffd80378ab828,0,1,0) at rt_match+0xbe rt_clone sys/net/route.c:266 [inline] rt_match(fffffd80378ab828,0,1,0) at rt_match+0xbe sys/net/route.c:242 in_pcbselsrc(ffff80001594e6a0,fffffd8024dadc20,fffffd80378ab7a8) at in_pcbselsrc+0x219 sys/netinet/in_pcb.c:934 in_pcbconnect(fffffd80378ab7a8,fffffd8024dadc00) at in_pcbconnect+0x107 sys/netinet/in_pcb.c:492 udp_usrreq(fffffd80378acd80,4,0,fffffd8024dadc00,0,ffff8000ffff2018) at udp_usrreq+0x560 sys_connect(ffff8000ffff2018,ffff80001594e828,ffff80001594e870) at sys_connect+0x3df sys/kern/uipc_syscalls.c:388 syscall(ffff80001594e8f0) at syscall+0x507 sys/arch/amd64/amd64/trap.c:555 Xsyscall(6,0,fffffffffffffed2,0,3,f06a7d13010) at Xsyscall+0x128 end of kernel end trace frame: 0xf08fe084e90, count: 2 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.