Warning: Permanently added '10.128.0.235' (ECDSA) to the list of known hosts. 2019/10/09 08:57:47 fuzzer started 2019/10/09 08:57:47 dialing manager at 10.128.0.248:59866 2019/10/09 08:57:47 syscalls: 496 2019/10/09 08:57:47 code coverage: enabled 2019/10/09 08:57:47 comparison tracing: enabled 2019/10/09 08:57:47 extra coverage: support is not implemented in syzkaller 2019/10/09 08:57:47 setuid sandbox: support is not implemented in syzkaller 2019/10/09 08:57:47 namespace sandbox: support is not implemented in syzkaller 2019/10/09 08:57:47 Android sandbox: support is not implemented in syzkaller 2019/10/09 08:57:47 fault injection: support is not implemented in syzkaller 2019/10/09 08:57:47 leak checking: support is not implemented in syzkaller 2019/10/09 08:57:47 net packet injection: enabled 2019/10/09 08:57:47 net device setup: support is not implemented in syzkaller 2019/10/09 08:57:47 concurrency sanitizer: support is not implemented in syzkaller 08:57:47 executing program 0: poll(&(0x7f0000000040), 0x2354, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e00749) ppoll(&(0x7f0000000080)=[{r0}], 0x14, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 08:57:47 executing program 1: poll(&(0x7f0000000080), 0x3c, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e0065f) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/125, 0x7d}], 0x1) shutdown(r0, 0x0) 08:57:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/105, 0x69}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x100000000, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000bc0), 0xdf) recvfrom$inet(r3, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000600)=[{&(0x7f0000000280)=""/214, 0xd6}, {0x0}, {0x0}], 0x3) shutdown(r3, 0x0) shutdown(r1, 0x0) 08:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000040)=""/205, 0xcd}, {0x0}, {0x0}, {0x0}, {0x0, 0xff5d}, {0x0, 0x24b}], 0x10000000000000b2) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) fstat(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0xfffffe44, 0x2, 0x0, 0x800e00521) shutdown(r1, 0x0) login: panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570611467 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242c75b0 vpanic() at vpanic+0x1e0/frame 0xfffffe00242c7610 panic() at panic+0x43/frame 0xfffffe00242c7670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242c76e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe00242c7770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe00242c7840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242c78b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe00242c7980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe00242c7ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00242c7ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 765 tid 100105 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why