panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0xa: popq %rbp TID PID UID PRFLAGS PFLAGS CPU COMMAND 333008 99026 0 0 0 0 syz-executor1 *483973 99026 0 0 0x4000000 1K syz-executor1 db_enter() at db_enter+0xa sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(ffffff005ebb6000,ffff800000173290,ffffff0060aa2800) at ip_fragment+0x5f4 ip_output(ffffff006f2dd690,ffffff0060aa2800,ffffff005ebb6000,22,7c6,f8f1781b6a2537e1) at ip_output+0xc6c sys/netinet/ip_output.c:501 rip_output(0,9,ffffff005fa587d8,0) at rip_output+0x187 sys/netinet/raw_ip.c:293 rip_usrreq(183a,ffffff005fa587d8,0,ffffff0060aa2800,0,f8f1781b6a2537e1) at rip_usrreq+0x3ed sys/netinet/raw_ip.c:472 sosend(ffffff0068232d30,ffff800021180ef8,7c6,ffff800021180fa0,0,f8f1781b6a2537e1) at sosend+0x46a sys/kern/uipc_socket.c:513 dofilewritev(ffff8000210a2e28,ffff800021180fa0,7c6,ffff800021180fb8,e6e66ab0f68) at dofilewritev+0x13e sys/kern/sys_generic.c:364 sys_write(40,ffff8000210a2e28,0) at sys_write+0x6e sys/kern/sys_generic.c:283 syscall(0) at syscall+0x489 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(0) at syscall+0x489 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,c,0,3,e6b9cc4a0d8) at Xsyscall+0x128 end of kernel end trace frame: 0xe6e66ab0ff0, count: 4 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.