Warning: Permanently added '10.128.0.150' (ECDSA) to the list of known hosts. 2019/10/09 10:33:20 fuzzer started 2019/10/09 10:33:20 dialing manager at 10.128.0.248:59866 2019/10/09 10:33:20 syscalls: 496 2019/10/09 10:33:20 code coverage: enabled 2019/10/09 10:33:20 comparison tracing: enabled 2019/10/09 10:33:20 extra coverage: support is not implemented in syzkaller 2019/10/09 10:33:20 setuid sandbox: support is not implemented in syzkaller 2019/10/09 10:33:20 namespace sandbox: support is not implemented in syzkaller 2019/10/09 10:33:20 Android sandbox: support is not implemented in syzkaller 2019/10/09 10:33:20 fault injection: support is not implemented in syzkaller 2019/10/09 10:33:20 leak checking: support is not implemented in syzkaller 2019/10/09 10:33:20 net packet injection: enabled 2019/10/09 10:33:20 net device setup: support is not implemented in syzkaller 2019/10/09 10:33:20 concurrency sanitizer: support is not implemented in syzkaller 10:33:20 executing program 0: poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x3}, {0xffffffffffffffff, 0x2005}, {0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x4}, {}], 0x8, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x24f, 0x0, 0x0, 0x800e00436) ppoll(&(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 10:33:20 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000100)=[{}, {r0}, {}, {r1}], 0x4, 0x8000000000049) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e, 0x0, 0x0, 0x800e004de) r3 = dup(r2) setsockopt$inet_msfilter(r3, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x1000001ab, 0x0, 0x0, 0x800e004e1) shutdown(r3, 0x0) 10:33:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp=@mask_reply={0x11, 0x500}}}}}) setuid(0xffffffffffffffff) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00d56) 10:33:20 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x800000000004a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DIOCCHANGEALTQV1(r0, 0xc1304431, 0x0) recvfrom$inet(r1, 0x0, 0xffffffa9, 0x0, 0x0, 0x800e00516) fsync(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) shutdown(r2, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570617200 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe002429a5b0 vpanic() at vpanic+0x1e0/frame 0xfffffe002429a610 panic() at panic+0x43/frame 0xfffffe002429a670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe002429a6e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe002429a770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe002429a840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe002429a8b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe002429a980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe002429aab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe002429aab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 760 tid 100096 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why