login: panic: receive 3: so 0xffffff0036349908, so_type 1, m 0xffffff0034cee400, m_type 6 Stopped at db_enter+0xa: popq %rbp TID PID UID PRFLAGS PFLAGS CPU COMMAND * 57407 34479 0 0 0x4000000 0 syz-executor0 db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 soreceive(0,ffffff0036349908,0,106d,ffff800014aa2760,40) at soreceive+0x1288 sys/kern/uipc_socket.c:933 recvit(ffff800014aa2790,ffff800014aa2898,ffff800014aa2880,ffff8000ffffc710,0) at recvit+0x28c sys/kern/uipc_syscalls.c:822 sys_recvmsg(ffff800014aa2920,ffff8000ffffc710,ffff800014a16628) at sys_recvmsg+0x120 sys/kern/uipc_syscalls.c:758 syscall(0) at syscall+0x3e4 Xsyscall(6,0,ffffffffffffffc1,0,3,38a29b7a010) at Xsyscall+0x128 end of kernel end trace frame: 0x38c87184870, count: 8 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> show panic receive 3: so 0xffffff0036349908, so_type 1, m 0xffffff0034cee400, m_type 6 ddb> trace db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 soreceive(0,ffffff0036349908,0,106d,ffff800014aa2760,40) at soreceive+0x1288 sys/kern/uipc_socket.c:933 recvit(ffff800014aa2790,ffff800014aa2898,ffff800014aa2880,ffff8000ffffc710,0) at recvit+0x28c sys/kern/uipc_syscalls.c:822 sys_recvmsg(ffff800014aa2920,ffff8000ffffc710,ffff800014a16628) at sys_recvmsg+0x120 sys/kern/uipc_syscalls.c:758 syscall(0) at syscall+0x3e4 Xsyscall(6,0,ffffffffffffffc1,0,3,38a29b7a010) at Xsyscall+0x128 end of kernel end trace frame: 0x38c87184870, count: -7 ddb> show registers rdi 0xffffffff81e2d478 kprintf_mutex rsi 0x5 rbp 0xffff800014aa2520 rbx 0xffff800014aa25c0 rdx 0x3fd rcx 0 rax 0x1 r8 0xffff800014aa24f0 r9 0 r10 0xefd926cbb8ffd669 r11 0xffffffff811502b0 x86_bus_space_io_read_1 r12 0x3000000008 r13 0xffff800014aa2530 r14 0x100 r15 0xffffffff81bc129c cmd0646_9_tim_udma+0x1ac7 rip 0xffffffff81471bda db_enter+0xa cs 0x8 rflags 0x202 rsp 0xffff800014aa2520 ss 0x10 db_enter+0xa: popq %rbp ddb> show proc PROC (syz-executor0) pid=57407 stat=onproc flags process=0 proc=4000000 pri=24, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff800014a33528,0xffff8000ffffd080 process=0xffff800014a16628 user=0xffff800014a9d000, vmspace=0xffffff003f12c108 estcpu=0, cpticks=0, pctcpu=0.0 user=0, sys=0, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 67507 71107 86951 0 2 0 syz-executor1 67507 360489 86951 0 3 0x4000080 netio syz-executor1 67507 332466 86951 0 2 0x4000080 syz-executor1 34479 443657 76052 0 2 0 syz-executor0 *34479 57407 76052 0 7 0x4000000 syz-executor0 34479 273171 76052 0 3 0x4000080 fsleep syz-executor0 34479 421672 76052 0 2 0x4000000 syz-executor0 34479 375763 76052 0 2 0x4000000 syz-executor0 86951 229940 20171 0 3 0x82 nanosleep syz-executor1 76052 190509 20171 0 3 0x82 nanosleep syz-executor0 20171 142299 83047 0 3 0x82 thrsleep syz-execprog 20171 160399 83047 0 3 0x4000082 thrsleep syz-execprog 20171 220974 83047 0 3 0x4000082 thrsleep syz-execprog 20171 5243 83047 0 3 0x4000082 thrsleep syz-execprog 20171 196292 83047 0 3 0x4000082 kqread