Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2019/10/09 07:01:50 fuzzer started 2019/10/09 07:01:50 dialing manager at 10.128.0.248:59866 2019/10/09 07:01:50 syscalls: 496 2019/10/09 07:01:50 code coverage: enabled 2019/10/09 07:01:50 comparison tracing: enabled 2019/10/09 07:01:50 extra coverage: support is not implemented in syzkaller 2019/10/09 07:01:50 setuid sandbox: support is not implemented in syzkaller 2019/10/09 07:01:50 namespace sandbox: support is not implemented in syzkaller 2019/10/09 07:01:50 Android sandbox: support is not implemented in syzkaller 2019/10/09 07:01:50 fault injection: support is not implemented in syzkaller 2019/10/09 07:01:50 leak checking: support is not implemented in syzkaller 2019/10/09 07:01:50 net packet injection: enabled 2019/10/09 07:01:50 net device setup: support is not implemented in syzkaller 2019/10/09 07:01:50 concurrency sanitizer: support is not implemented in syzkaller 07:01:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/91, 0x5b}], 0x1, 0x0}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000040)=""/35, 0x23}, {0x0}, {0x0}], 0x3) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000008c0)=[{&(0x7f0000000140)=""/171, 0xab}, {0x0}], 0x2) shutdown(r5, 0x0) shutdown(r2, 0x0) 07:01:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000180)=""/13, 0xd}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5e36, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/70, 0x46}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xcc, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) shutdown(0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r4, &(0x7f0000000180)=[{&(0x7f0000001a00)=""/4096, 0x1000}, {0x0}], 0x2) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:01:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/178, 0xb2}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/19, 0x13}], 0x1, 0x0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e00546) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000001c40)=[{&(0x7f0000000000)=""/207, 0xcf}], 0x1) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r7, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/5, 0x5}, {0x0}], 0x2) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 07:01:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/194, 0xc2}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000001600), 0xa, 0x0}, 0x0) shutdown(r2, 0x0) login: panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/main/kernel/sys/net/if.c:3827 cpuid = 0 time = 1570604510 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00242e55b0 vpanic() at vpanic+0x1e0/frame 0xfffffe00242e5610 panic() at panic+0x43/frame 0xfffffe00242e5670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe00242e56e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe00242e5770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe00242e5840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe00242e58b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe00242e5980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe00242e5ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe00242e5ab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 760 tid 100111 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why