Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. 2019/10/09 07:40:27 fuzzer started 2019/10/09 07:40:27 dialing manager at 10.128.0.248:59866 2019/10/09 07:40:27 syscalls: 496 2019/10/09 07:40:27 code coverage: enabled 2019/10/09 07:40:27 comparison tracing: enabled 2019/10/09 07:40:27 extra coverage: support is not implemented in syzkaller 2019/10/09 07:40:27 setuid sandbox: support is not implemented in syzkaller 2019/10/09 07:40:27 namespace sandbox: support is not implemented in syzkaller 2019/10/09 07:40:27 Android sandbox: support is not implemented in syzkaller 2019/10/09 07:40:27 fault injection: support is not implemented in syzkaller 2019/10/09 07:40:27 leak checking: support is not implemented in syzkaller 2019/10/09 07:40:27 net packet injection: enabled 2019/10/09 07:40:27 net device setup: support is not implemented in syzkaller 2019/10/09 07:40:27 concurrency sanitizer: support is not implemented in syzkaller 07:40:27 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0x46) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0x100000000}}) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) 07:40:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000140)=""/204, 0xcc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7, 0x0}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x93f1, 0x0, 0x0, 0x800e0054f) shutdown(r1, 0x0) poll(0x0, 0x0, 0x4e) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfe92, 0x0, 0x0, 0x800e0085f) ppoll(&(0x7f0000000040)=[{r3}, {r3}], 0x2, 0x0, 0x0, 0x0) shutdown(r2, 0x0) 07:40:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/249, 0xf9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) 07:40:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6, 0x0}, 0x802) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) shutdown(r1, 0x0) ftruncate(r0, 0x0) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570606827 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0022af15b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0022af1610 panic() at panic+0x43/frame 0xfffffe0022af1670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe0022af16e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0022af1770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0022af1840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe0022af18b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0022af1980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0022af1ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0022af1ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 764 tid 100113 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why