Autoloading module: intpm.ko Starting background file system checks in 60 seconds. Tue Oct 8 17:22 FreeBSD/amd64 (ci-freebsd-i386-2.c.syzkaller.internal) (ttyu0) Warning: Permanently added '10.128.1.40' (ECDSA) to the list of known hosts. 2019/10/08 17:22:40 fuzzer started 2019/10/08 17:22:40 dialing manager at 10.128.0.248:17179 2019/10/08 17:22:40 checking machine... 2019/10/08 17:22:40 checking revisions... 2019/10/08 17:22:40 testing simple program... 2019/10/08 17:22:40 building call list... 2019/10/08 17:22:54 syscalls: 496 2019/10/08 17:22:54 code coverage: enabled 2019/10/08 17:22:54 comparison tracing: enabled 2019/10/08 17:22:54 extra coverage: support is not implemented in syzkaller 2019/10/08 17:22:54 setuid sandbox: support is not implemented in syzkaller 2019/10/08 17:22:54 namespace sandbox: support is not implemented in syzkaller 2019/10/08 17:22:54 Android sandbox: support is not implemented in syzkaller 2019/10/08 17:22:54 fault injection: support is not implemented in syzkaller 2019/10/08 17:22:54 leak checking: support is not implemented in syzkaller 2019/10/08 17:22:54 net packet injection: enabled 2019/10/08 17:22:54 net device setup: support is not implemented in syzkaller 2019/10/08 17:22:54 concurrency sanitizer: support is not implemented in syzkaller 17:22:54 executing program 0: __semctl$IPC_SET(0x0, 0x0, 0xa, 0x0) poll(&(0x7f0000000180), 0x1, 0xff) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)={{0xffffffff284002a1}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff2840029f}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000200)={{0xffffffff2840029b}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)={{0xffffffff2840029a}}) 17:22:54 executing program 1: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0xa, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000300)={{0xffffffff284002af}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000002c0)={{0xffffffff284002a1}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000180)={{0xffffffff28400299}}) 17:22:54 executing program 2: poll(&(0x7f00000000c0), 0x4, 0x172) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000180)={{0xffffffff2840029f}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff284002cb}}) 17:22:54 executing program 3: r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x40000400001002c6, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x2000000000000016, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029f}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff284002cb}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029b}}) login: panic: Assertion in_epoch(net_epoch_preempt) failed at /syzkaller/managers/i386/kernel/sys/net/if.c:3827 cpuid = 0 time = 1570555374 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe002426d5b0 vpanic() at vpanic+0x1e0/frame 0xfffffe002426d610 panic() at panic+0x43/frame 0xfffffe002426d670 if_setlladdr() at if_setlladdr+0x34c/frame 0xfffffe002426d6e0 ifhwioctl() at ifhwioctl+0x9e0/frame 0xfffffe002426d770 ifioctl() at ifioctl+0x4c2/frame 0xfffffe002426d840 kern_ioctl() at kern_ioctl+0x465/frame 0xfffffe002426d8b0 sys_ioctl() at sys_ioctl+0x267/frame 0xfffffe002426d980 amd64_syscall() at amd64_syscall+0x477/frame 0xfffffe002426dab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe002426dab0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x8004882ca, rsp = 0x7fffffffe428, rbp = 0x7fffffffe470 --- KDB: enter: panic [ thread pid 769 tid 100087 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why