panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0xa: popq %rbp TID PID UID PRFLAGS PFLAGS CPU COMMAND 362575 33576 0 0 0 0 syz-executor1 *455661 33576 0 0 0x4000000 1K syz-executor1 db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(ffffff007b90c07c,ffff800000173290,ffffff007df65000) at ip_fragment+0x5f4 ip_output(ffffff006f2d9578,ffffff007df65000,ffffff007b90c07c,22,11ba,1c9742c68d1655c3) at ip_output+0xc6c sys/netinet/ip_output.c:501 rip_output(0,9,ffffff0061716648,0) at rip_output+0x187 sys/netinet/raw_ip.c:293 rip_usrreq(e46,ffffff0061716648,0,ffffff007df65000,0,1c9742c68d1655c3) at rip_usrreq+0x3ed sys/netinet/raw_ip.c:472 sosend(ffffff007b4fbcc0,ffff800021193908,11ba,ffff800021193a30,0,1c9742c68d1655c3) at sosend+0x46a sys/kern/uipc_socket.c:513 dofilewritev(0,3,ffff8000210a3788,ffff800021193a30,ffff800021193a48) at dofilewritev+0x13e sys/kern/sys_generic.c:364 sys_writev(790,ffff8000210a3788,0) at sys_writev+0xce sys/kern/sys_generic.c:310 syscall(0) at syscall+0x489 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(0) at syscall+0x489 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,d,0,3,e6617461010) at Xsyscall+0x128 end of kernel end trace frame: 0xe68509abfb0, count: 4 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.