panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *279557 39846 32767 0x10 0x4000000 1 syz-executor1 346510 93611 32767 0x10 0 0 syz-executor0 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(d9fadc4eb45f3c77,ffffff006d4ab0b0,ffff800000173290) at ip_fragment+0x625 ip_output(b19577ef98517dc1,ffffff006f4aa000,ffffff006d809100,ffffff006ffc9e00,ffffff006d809100,ffffff006f4ab600) at ip_output+0xc8d sys/netinet/ip_output.c:501 udp_output(eef9fae4c6fd1c26,1041,ffffff006f4ab600,ffffff006ffc9e00) at udp_output+0x45a sys/netinet/udp_usrreq.c:1004 sosend(6ce626e7b74960e9,ffffff006fa8a618,ffff80002108a720,11e7,ffff80002108a720,ffff80002108a740) at sosend+0x47a sys/kern/uipc_socket.c:513 sendit(f91f519b71522cff,ffff80002108a720,ffff80002114d4a0,ffff80002114d3a0,ffff80002114d4b8) at sendit+0x431 sys/kern/uipc_syscalls.c:662 sys_sendmsg(21c01703a4bd9ed2,1c0,ffff80002108a720) at sys_sendmsg+0x162 sys/kern/uipc_syscalls.c:567 syscall(e84bd07f0f468ae0) at syscall+0x496 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(e84bd07f0f468ae0) at syscall+0x496 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,ffffffffffffffd3,0,3,c67bdbbe010) at Xsyscall+0x128 end of kernel end trace frame: 0xc69d898ef00, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb{1}> ddb{1}> set $lines = 0 ddb{1}> show panic malformed IPv4 option passed to ip_optcopy ddb{1}> trace db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(d9fadc4eb45f3c77,ffffff006d4ab0b0,ffff800000173290) at ip_fragment+0x625 ip_output(b19577ef98517dc1,ffffff006f4aa000,ffffff006d809100,ffffff006ffc9e00,ffffff006d809100,ffffff006f4ab600) at ip_output+0xc8d sys/netinet/ip_output.c:501 udp_output(eef9fae4c6fd1c26,1041,ffffff006f4ab600,ffffff006ffc9e00) at udp_output+0x45a sys/netinet/udp_usrreq.c:1004 sosend(6ce626e7b74960e9,ffffff006fa8a618,ffff80002108a720,11e7,ffff80002108a720,ffff80002108a740) at sosend+0x47a sys/kern/uipc_socket.c:513 sendit(f91f519b71522cff,ffff80002108a720,ffff80002114d4a0,ffff80002114d3a0,ffff80002114d4b8) at sendit+0x431 sys/kern/uipc_syscalls.c:662 sys_sendmsg(21c01703a4bd9ed2,1c0,ffff80002108a720) at sys_sendmsg+0x162 sys/kern/uipc_syscalls.c:567 syscall(e84bd07f0f468ae0) at syscall+0x496 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(e84bd07f0f468ae0) at syscall+0x496 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,ffffffffffffffd3,0,3,c67bdbbe010) at Xsyscall+0x128 end of kernel end trace frame: 0xc69d898ef00, count: -10 ddb{1}> show registers rdi 0xffffffff81f00128 kprintf_mutex rsi 0xffffffff81150e07 db_enter+0x17 rbp 0xffff80002114cf50 rbx 0xffff80002114cff0 rdx 0xffff80000213d000 rcx 0x12d8 __ALIGN_SIZE+0x2d8 rax 0xffff80000213d000 r8 0xffff80002114cf20 r9 0 r10 0x3e2e8a6828fd05a8 r11 0x1106051b4740794c r12 0x3000000008 r13 0xffff80002114cf60 r14 0x100 r15 0xffffffff81cd528d apollo_udma100_tim+0xde73 rip 0xffffffff81150e08 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff80002114cf40 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb{1}> show proc PROC (syz-executor1) pid=279557 stat=onproc flags process=10 proc=4000000 pri=76, usrpri=76, nice=20 forw=0xffffffffffffffff, list=0xffff80002108a018,0xffffffff81f8d720 process=0xffff8000210649e8 user=0xffff800021148000, vmspace=0xffffff00659a1c68 estcpu=36, cpticks=0, pctcpu=0.0 user=0, sys=0, intr=0 ddb{1}> ps PID TID PPID UID S FLAGS WAIT COMMAND 39846 26047 56888 32767 2 0x10 syz-executor1 *39846 279557 56888 32767 7 0x4000010 syz-executor1 93611 346510 28282 32767 7 0x10 syz-executor0 93611 383901 28282 32767 3 0x4000090 netcon2 syz-executor0 56888 341440 727 32767 3 0x90 nanosleep syz-executor1 727 244895 47977 0 3 0x82 wait syz-executor1 28282 39232 99080 32767 3 0x90 nanosleep syz-executor0 99080 456759 47977 0 3 0x82 wait syz-executor0 40297 44670 0 0 3 0x14200 bored sosplice 47977 330579 76691 0 3 0x82 thrsleep syz-fuzzer 47977 111731 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 237957 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 304922 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 215139 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 178975 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 385082 76691 0 3 0x4000082 kqread syz-fuzzer 47977 117989 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 68605 76691 0 3 0x4000082 thrsleep syz-fuzzer 47977 385650 76691 0 3 0x4000082 thrsleep syz-fuzzer 76691 407146 14544 0 3 0x10008a pause ksh 14544 490449 42970 0 3 0x92 select sshd 37861 440400 1 0 3 0x100083 ttyin getty 42970 287431 1 0 3 0x80 select sshd 89518 365584 54326 73 3 0x100090 kqread syslogd 54326 95551 1 0 3 0x100082 netio syslogd 77740 217664 1 77 3 0x100090 poll dhclient 10144 32302 1 0 3 0x80 poll dhclient 42681 251236 0 0 2 0x14200 zerothread 20491 436872 0 0 3 0x14200 aiodoned aiodoned 68718 199426 0 0 3 0x14200 syncer update 92719 223304 0 0 3 0x14200 cleaner cleaner 86721 250946 0 0 3 0x14200 reaper reaper 97281 141727 0 0 3 0x14200 pgdaemon pagedaemon 73651 395878 0 0 3 0x14200 bored crynlk 49066 298658 0 0 3 0x14200 bored crypto 52880 102356 0 0 3 0x40014200 acpi0 acpi0 70248 31377 0 0 3 0x40014200 idle1 38022 380523 0 0 3 0x14200 bored softnet 93558 86459 0 0 3 0x14200 bored systqmp 7071 240403 0 0 3 0x14200 bored systq 47848 481287 0 0 3 0x40014200 bored softclock 91360 23476 0 0 3 0x40014200 idle0 1 52101 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper