Warning: Permanently added '10.128.0.255' (ECDSA) to the list of known hosts. 2019/10/09 09:17:15 fuzzer started 2019/10/09 09:17:15 dialing manager at 10.128.0.248:59866 2019/10/09 09:17:15 syscalls: 496 2019/10/09 09:17:15 code coverage: enabled 2019/10/09 09:17:15 comparison tracing: enabled 2019/10/09 09:17:15 extra coverage: support is not implemented in syzkaller 2019/10/09 09:17:15 setuid sandbox: support is not implemented in syzkaller 2019/10/09 09:17:15 namespace sandbox: support is not implemented in syzkaller 2019/10/09 09:17:15 Android sandbox: support is not implemented in syzkaller 2019/10/09 09:17:15 fault injection: support is not implemented in syzkaller 2019/10/09 09:17:15 leak checking: support is not implemented in syzkaller 2019/10/09 09:17:15 net packet injection: enabled 2019/10/09 09:17:15 net device setup: support is not implemented in syzkaller 2019/10/09 09:17:15 concurrency sanitizer: support is not implemented in syzkaller 09:17:15 executing program 0: poll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x800000000004b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x35f, 0x0, 0x0, 0x800e004e5) r1 = dup(r0) r2 = dup2(r1, r0) ioctl$DIOCSETLIMIT(0xffffffffffffffff, 0xc0084428, &(0x7f0000000000)) recvfrom$inet(r2, 0x0, 0x105, 0x0, 0x0, 0x800e004e1) shutdown(r0, 0x0) 09:17:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() wait4(r1, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x100000211, 0x2, 0x0, 0x800e0052e) shutdown(r0, 0x0) 09:17:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/244, 0xf4}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe79, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000140)={0x8000}, 0x104) getsockopt$sock_int(r1, 0xffff, 0x1004, 0x0, &(0x7f00000000c0)) recvfrom$inet(r4, 0x0, 0x503, 0x0, 0x0, 0x800e0051d) shutdown(r3, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 0 time = 1570612635 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0022a2e5b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0022a2e610 panic() at panic+0x43/frame 0xfffffe0022a2e670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe0022a2e6e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0022a2e770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0022a2e840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe0022a2e8b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0022a2e980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0022a2eab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0022a2eab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 761 tid 100074 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why