Warning: Permanently added '10.128.10.55' (ECDSA) to the list of known hosts. 2019/10/09 10:53:03 fuzzer started 2019/10/09 10:53:03 dialing manager at 10.128.0.248:59866 2019/10/09 10:53:03 syscalls: 496 2019/10/09 10:53:03 code coverage: enabled 2019/10/09 10:53:03 comparison tracing: enabled 2019/10/09 10:53:03 extra coverage: support is not implemented in syzkaller 2019/10/09 10:53:03 setuid sandbox: support is not implemented in syzkaller 2019/10/09 10:53:03 namespace sandbox: support is not implemented in syzkaller 2019/10/09 10:53:03 Android sandbox: support is not implemented in syzkaller 2019/10/09 10:53:03 fault injection: support is not implemented in syzkaller 2019/10/09 10:53:03 leak checking: support is not implemented in syzkaller 2019/10/09 10:53:03 net packet injection: enabled 2019/10/09 10:53:03 net device setup: support is not implemented in syzkaller 2019/10/09 10:53:03 concurrency sanitizer: support is not implemented in syzkaller 10:53:03 executing program 0: poll(&(0x7f0000000380)=[{}], 0x2199, 0x4f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x7b, 0x0, 0x0, 0x800e00640) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/209, 0xd1}], 0x1, 0x0}, 0x0) shutdown(r0, 0x0) 10:53:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001740)=[{&(0x7f0000000000)=""/147, 0x93}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) nanosleep(&(0x7f00000000c0)={0x6}, &(0x7f0000000100)) shutdown(r2, 0x0) 10:53:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfce4, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000), 0x4) recvfrom$inet(r2, 0x0, 0xcebf, 0x0, 0x0, 0x800e00519) shutdown(r2, 0x0) 10:53:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e5cc83, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) fcntl$dupfd(r1, 0x0, r1) recvfrom$inet(r2, 0x0, 0x3c7, 0x0, 0x0, 0x800e00545) shutdown(r2, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 0 time = 1570618383 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242815b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0024281610 panic() at panic+0x43/frame 0xfffffe0024281670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242816e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0024281770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0024281840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242818b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0024281980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0024281ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0024281ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 764 tid 100091 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why