Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2019/03/22 16:32:26 fuzzer started 2019/03/22 16:32:26 dialing manager at 10.128.0.248:36767 2019/03/22 16:32:26 syscalls: 1 2019/03/22 16:32:26 code coverage: enabled 2019/03/22 16:32:26 comparison tracing: enabled 2019/03/22 16:32:26 extra coverage: support is not implemented in syzkaller 2019/03/22 16:32:26 setuid sandbox: support is not implemented in syzkaller 2019/03/22 16:32:26 namespace sandbox: support is not implemented in syzkaller 2019/03/22 16:32:26 Android sandbox: support is not implemented in syzkaller 2019/03/22 16:32:26 fault injection: support is not implemented in syzkaller 2019/03/22 16:32:26 leak checking: support is not implemented in syzkaller 2019/03/22 16:32:26 net packet injection: enabled 2019/03/22 16:32:26 net device setup: support is not implemented in syzkaller 16:32:36 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) 16:32:36 executing program 1: 16:32:36 executing program 2: 16:32:36 executing program 3: setrlimit(0x0, 0x0) setrlimit(0x7, &(0x7f0000000180)={0x6, 0x7}) 16:32:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) chroot(&(0x7f0000000180)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xfffffcba, 0x0, 0x0, &(0x7f00000002c0)=""/210, 0xd2}, 0x0) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000ffff00000100000008cd7fdf03000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1], 0x28}, 0x0) 16:32:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) 16:32:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, 0x0, &(0x7f00000000c0)) 16:32:36 executing program 3: 16:32:36 executing program 0: r0 = semget$private(0x0, 0x3, 0x94) semop(r0, &(0x7f00000002c0)=[{0x1, 0x1, 0x1000}, {0x0, 0x0, 0x1800}], 0x2) 16:32:36 executing program 1: 16:32:36 executing program 3: 16:32:36 executing program 2: 16:32:36 executing program 1: 16:32:36 executing program 3: 16:32:36 executing program 2: 16:32:36 executing program 1: setuid(0xee01) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 16:32:36 executing program 0: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0xffffffffffffff78, 0x0, 0x0, &(0x7f0000001440)=[@rights={0x14, 0x7}, @cred={0x5e00800a}], 0x18}, 0x0) 16:32:36 executing program 3: 16:32:36 executing program 2: 16:32:36 executing program 3: 16:32:36 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4}, 0x0) 16:32:36 executing program 2: r0 = msgget$private(0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x28402, 0x40) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0x0, 0x471}, &(0x7f00000000c0)=0x8) setsockopt$inet6_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000140)={r2, 0x31a320b0}, 0x8) setsockopt$inet6_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x902, &(0x7f0000000100)=r2, 0x4) msgsnd(r0, &(0x7f0000000040), 0x0, 0x0) panic: udp_output: shared udbinfo lock, excl inp lock cpuid = 0 time = 1553272356 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe001fa84560 vpanic() at vpanic+0x1e0/frame 0xfffffe001fa845c0 panic() at panic+0x43/frame 0xfffffe001fa84620 udp_send() at udp_send+0x1377/frame 0xfffffe001fa84730 sosend_dgram() at sosend_dgram+0x550/frame 0xfffffe001fa847a0 sosend() at sosend+0xc6/frame 0xfffffe001fa84810 kern_sendit() at kern_sendit+0x35e/frame 0xfffffe001fa848c0 sendit() at sendit+0x226/frame 0xfffffe001fa84920 sys_sendmsg() at sys_sendmsg+0x8b/frame 0xfffffe001fa84980 amd64_syscall() at amd64_syscall+0x436/frame 0xfffffe001fa84ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe001fa84ab0 --- syscall (198, FreeBSD ELF64, nosys), rip = 0x412e7a, rsp = 0x7fffdfffdf38, rbp = 0x3 --- KDB: enter: panic [ thread pid 806 tid 100127 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why