Warning: Permanently added '10.128.0.170' (ECDSA) to the list of known hosts. 2019/10/09 08:32:53 fuzzer started 2019/10/09 08:32:53 dialing manager at 10.128.0.248:59866 2019/10/09 08:32:53 syscalls: 496 2019/10/09 08:32:53 code coverage: enabled 2019/10/09 08:32:53 comparison tracing: enabled 2019/10/09 08:32:53 extra coverage: support is not implemented in syzkaller 2019/10/09 08:32:53 setuid sandbox: support is not implemented in syzkaller 2019/10/09 08:32:53 namespace sandbox: support is not implemented in syzkaller 2019/10/09 08:32:53 Android sandbox: support is not implemented in syzkaller 2019/10/09 08:32:53 fault injection: support is not implemented in syzkaller 2019/10/09 08:32:53 leak checking: support is not implemented in syzkaller 2019/10/09 08:32:53 net packet injection: enabled 2019/10/09 08:32:53 net device setup: support is not implemented in syzkaller 2019/10/09 08:32:53 concurrency sanitizer: support is not implemented in syzkaller 08:32:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00835) 08:32:53 executing program 1: poll(0x0, 0x0, 0x40) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfe05, 0x0, 0x0, 0x800e00515) fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r0, 0x0, 0xfffffd64, 0x0, 0x0, 0x800e00649) shutdown(r0, 0x0) 08:32:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unlinkat(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xd248eaae, 0x0, 0x0, 0x800e006ea) shutdown(r0, 0x0) 08:32:53 executing program 3: recvfrom$inet(0xffffffffffffffff, 0x0, 0x24f, 0x0, 0x0, 0x800e0042e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000280)=""/215, 0xd7}, {0x0}], 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000024c0)=""/8, 0x8}], 0x1, 0x0}, 0x42) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/1, 0x1}], 0x1, 0x0}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570609973 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242955b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0024295610 panic() at panic+0x43/frame 0xfffffe0024295670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242956e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0024295770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0024295840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242958b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0024295980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0024295ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0024295ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 764 tid 100095 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why