Warning: Permanently added '10.128.0.8' (ECDSA) to the list of known hosts. 2019/10/09 10:07:58 fuzzer started 2019/10/09 10:07:58 dialing manager at 10.128.0.248:59866 2019/10/09 10:07:58 syscalls: 496 2019/10/09 10:07:58 code coverage: enabled 2019/10/09 10:07:58 comparison tracing: enabled 2019/10/09 10:07:58 extra coverage: support is not implemented in syzkaller 2019/10/09 10:07:58 setuid sandbox: support is not implemented in syzkaller 2019/10/09 10:07:58 namespace sandbox: support is not implemented in syzkaller 2019/10/09 10:07:58 Android sandbox: support is not implemented in syzkaller 2019/10/09 10:07:58 fault injection: support is not implemented in syzkaller 2019/10/09 10:07:58 leak checking: support is not implemented in syzkaller 2019/10/09 10:07:58 net packet injection: enabled 2019/10/09 10:07:58 net device setup: support is not implemented in syzkaller 2019/10/09 10:07:58 concurrency sanitizer: support is not implemented in syzkaller 10:07:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000200)=""/253, 0xfd}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/48, 0x30}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/137, 0x89}], 0x1) shutdown(r4, 0x0) shutdown(r2, 0x0) 10:07:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/251, 0xfb}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f00000000c0)={0x0, 0xffff}, 0x10) ioctl$DIOCRGETASTATS(0xffffffffffffffff, 0xc4504447, 0x0) recvfrom$inet(r2, 0x0, 0xfefc, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) 10:07:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f00000016c0)=""/147, 0x93}, {0x0, 0xfec2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x2e8}], 0x8, 0x0}, 0x40002) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)=""/4096, 0x5df}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x3, 0x0, 0xfffffcfa}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570615679 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0022a925b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0022a92610 panic() at panic+0x43/frame 0xfffffe0022a92670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe0022a926e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0022a92770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0022a92840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe0022a928b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0022a92980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0022a92ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0022a92ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 766 tid 100094 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why