panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND 195007 94160 0 0 0 0 syz-executor1 * 43794 94160 0 0 0x4000000 1K syz-executor1 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(35c501af049f9145,ffffff006d6d78b0,ffff800000173290) at ip_fragment+0x625 ip_output(6ed3a5a796aeb267,ffffff006f30c578,ffffff0064d9e900,0,ffffff0064d9e900,ffffff006e725908) at ip_output+0xc8d sys/netinet/ip_output.c:501 udp_output(328c3182712fd3c6,110f,ffffff006e725908,0) at udp_output+0x45a sys/netinet/udp_usrreq.c:1004 sosend(8a6411b86740832b,ffffff007c736270,ffff800021171b68,ffff800021171ca0,12f1,0) at sosend+0x477 sys/kern/uipc_socket.c:513 dofilewritev(5ed14b551758824f,0,5,ffff80002108abd0,ffff800021171ca0) at dofilewritev+0x148 sys/kern/sys_generic.c:364 sys_writev(90d714e839d096a6,790,ffff80002108abd0) at sys_writev+0xdb sys/kern/sys_generic.c:310 syscall(d76f0cc6a2ec793f) at syscall+0x473 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(d76f0cc6a2ec793f) at syscall+0x473 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,d,0,3,e691b72f0d8) at Xsyscall+0x128 end of kernel end trace frame: 0xe6bca461cd0, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs.