Warning: Permanently added '10.128.0.125' (ECDSA) to the list of known hosts. 2019/10/09 10:59:59 fuzzer started 2019/10/09 10:59:59 dialing manager at 10.128.0.248:59866 2019/10/09 10:59:59 syscalls: 496 2019/10/09 10:59:59 code coverage: enabled 2019/10/09 10:59:59 comparison tracing: enabled 2019/10/09 10:59:59 extra coverage: support is not implemented in syzkaller 2019/10/09 10:59:59 setuid sandbox: support is not implemented in syzkaller 2019/10/09 10:59:59 namespace sandbox: support is not implemented in syzkaller 2019/10/09 10:59:59 Android sandbox: support is not implemented in syzkaller 2019/10/09 10:59:59 fault injection: support is not implemented in syzkaller 2019/10/09 10:59:59 leak checking: support is not implemented in syzkaller 2019/10/09 10:59:59 net packet injection: enabled 2019/10/09 10:59:59 net device setup: support is not implemented in syzkaller 2019/10/09 10:59:59 concurrency sanitizer: support is not implemented in syzkaller 10:59:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000000000)=""/21, 0x15}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6, 0x0}, 0x40042) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2a80, 0x2, 0x0, 0x800e00506) shutdown(r1, 0x0) dup(r0) recvfrom$inet(r2, 0x0, 0x1789836bed9020c0, 0x2, 0x0, 0x800e0050e) shutdown(r2, 0x0) 10:59:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x4, 0x0}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x51e, 0x2, 0x0, 0x800e00517) shutdown(r0, 0x0) fchdir(r0) recvfrom$inet(r1, 0x0, 0xfffffe75, 0x1004007e, 0x0, 0x800e0050e) shutdown(r1, 0x0) 10:59:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/129, 0x81}, {0x0}, {0x0}], 0x3, 0x0}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xff94, 0x0, 0x0, 0x800e00526) shutdown(r1, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@file={0xa, 0x0, './file0\x00'}, 0xa) recvfrom$inet(r2, 0x0, 0xff06, 0x0, 0x0, 0x800e0051e) shutdown(r2, 0x0) 10:59:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000000140)=0x80000008, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp=@mask_reply={0x11, 0x500}}}}}) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00799) panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 1 time = 1570618800 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0022a795b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0022a79610 panic() at panic+0x43/frame 0xfffffe0022a79670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe0022a796e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe0022a79770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe0022a79840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe0022a798b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe0022a79980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe0022a79ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0022a79ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 774 tid 100089 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why