Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2019/10/09 10:14:20 fuzzer started 2019/10/09 10:14:20 dialing manager at 10.128.0.248:59866 2019/10/09 10:14:20 syscalls: 496 2019/10/09 10:14:20 code coverage: enabled 2019/10/09 10:14:20 comparison tracing: enabled 2019/10/09 10:14:20 extra coverage: support is not implemented in syzkaller 2019/10/09 10:14:20 setuid sandbox: support is not implemented in syzkaller 2019/10/09 10:14:20 namespace sandbox: support is not implemented in syzkaller 2019/10/09 10:14:20 Android sandbox: support is not implemented in syzkaller 2019/10/09 10:14:20 fault injection: support is not implemented in syzkaller 2019/10/09 10:14:20 leak checking: support is not implemented in syzkaller 2019/10/09 10:14:20 net packet injection: enabled 2019/10/09 10:14:20 net device setup: support is not implemented in syzkaller 2019/10/09 10:14:20 concurrency sanitizer: support is not implemented in syzkaller 10:14:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/70, 0x46}, {0x0}, {0x0}], 0x3, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xcc, 0x0, 0x0, 0x800e00549) recvfrom$inet(r1, &(0x7f0000000240)=""/231, 0xe7, 0x2, 0x0, 0x0) shutdown(r0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x18, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xff4c, 0x80002, 0x0, 0x800e0054e) shutdown(r1, 0x0) 10:14:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000000)=""/114, 0x72}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) dup(0xffffffffffffffff) recvfrom$inet(r1, 0x0, 0x60a6, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 10:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000000000)=""/135, 0x267, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000000)=""/185, 0xb9}, {0x0}, {0x0}], 0x3, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffd00, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0xff) shutdown(r2, 0x0) dup2(r4, r5) shutdown(r5, 0x0) 10:14:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000280)=""/207, 0xcf}, {0x0}], 0x2, 0x0}, 0x40002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffe3, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x55, &(0x7f0000000000)={0x0, {{0x10, 0x2, 0x3, @rand_addr}}, {{0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}}}, 0x118) recvfrom$inet(r1, 0x0, 0x251277ea, 0x2, 0x0, 0x800e00510) shutdown(r1, 0x0) login: panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570616061 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242ef5b0 vpanic() at vpanic+0x1e0/frame 0xfffffe00242ef610 panic() at panic+0x43/frame 0xfffffe00242ef670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242ef6e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe00242ef770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe00242ef840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242ef8b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe00242ef980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe00242efab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00242efab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 763 tid 100113 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why