panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0x1c: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *397966 91688 0 0 0x4000000 0 syz-executor.6 db_enter() at db_enter+0x1c sys/arch/amd64/amd64/db_interface.c:437 panic(ffffffff828efb08) at panic+0x165 sys/kern/subr_prf.c:198 ip_fragment(fffffd807d63ce00,ffff800035db77b8,ffff80000019e2a8,5dc) at ip_fragment+0x7b1 ip_output(fffffd807d63ce00,0,fffffd80603de620,22,0,0,18eea1799befd560) at ip_output+0xe10 sys/netinet/ip_output.c:478 divert_output(fffffd80603de5a8,fffffd807d63ce00,fffffd80662ede00,0) at divert_output+0x2ca sys/netinet/ip_divert.c:174 sosend(fffffd80694ef020,fffffd80662ede00,ffff800035db7a30,0,0,0) at sosend+0x66d sendit(ffff80002db037f8,4,ffff800035db7bc8,0,ffff800035db7bb8) at sendit+0x65d sys/kern/uipc_syscalls.c:786 sys_sendmmsg(ffff80002db037f8,ffff800035db7d70,ffff800035db7cc0) at sys_sendmmsg+0x344 sys/kern/uipc_syscalls.c:677 syscall(ffff800035db7d70) at syscall+0x751 sys/arch/amd64/amd64/trap.c:577 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x431d616e350, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.