Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts. 2019/10/09 07:38:26 fuzzer started 2019/10/09 07:38:26 dialing manager at 10.128.0.248:59871 2019/10/09 07:38:26 syscalls: 496 2019/10/09 07:38:26 code coverage: enabled 2019/10/09 07:38:26 comparison tracing: enabled 2019/10/09 07:38:26 extra coverage: support is not implemented in syzkaller 2019/10/09 07:38:26 setuid sandbox: support is not implemented in syzkaller 2019/10/09 07:38:26 namespace sandbox: support is not implemented in syzkaller 2019/10/09 07:38:26 Android sandbox: support is not implemented in syzkaller 2019/10/09 07:38:26 fault injection: support is not implemented in syzkaller 2019/10/09 07:38:26 leak checking: support is not implemented in syzkaller 2019/10/09 07:38:26 net packet injection: enabled 2019/10/09 07:38:26 net device setup: support is not implemented in syzkaller 2019/10/09 07:38:26 concurrency sanitizer: support is not implemented in syzkaller 07:38:26 executing program 0: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000002c0)={{0xffffffff284002a1}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff2840029e}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000001180)={{0xffffffff2840029b}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff2840029a}}) 07:38:26 executing program 1: poll(&(0x7f0000000180)=[{}, {}, {}, {}], 0x4, 0xff) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000004c0)={{0xffffffff284002a1, 0xffffffffffffffff}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff2840029e}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000140)={{0xffffffff28400299}}) 07:38:26 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="a9c3936d6ee888a2fff1dec76466cce89de782d2bef3928a50e1a8837889ff725a605aa7139b10ee8edae1428549a53ac722e62c67eb746d1739a7375040ab87fdc41f903e762c8a8b8b0a23e57e03066b343f1f2365e5732d90fc2716ef6f8a3de94b65c2243e662a4a201a8f908809dfef527a5ea60a4b974b66e1087dc2eb242ff47c2e9de07c04c51728833ffcbe", 0xffffff5a, 0x105, &(0x7f0000000000)={0xfffffffffffffea3, 0x1c, 0x2, 0x0, @local, 0x1}, 0x1c) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff284002a1}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff2840029c}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000240)={{0xffffffff2840029b}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000001c0)={{0xffffffff284002c9}}) execve(0x0, 0x0, 0x0) 07:38:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x4, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000200)={{0xffffffff28400317}}) login: panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/i386/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570606706 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242d65b0 vpanic() at vpanic+0x1e0/frame 0xfffffe00242d6610 panic() at panic+0x43/frame 0xfffffe00242d6670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242d66e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe00242d6770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe00242d6840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242d68b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe00242d6980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe00242d6ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00242d6ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 763 tid 100108 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why