[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.97' (ECDSA) to the list of known hosts. 2021/05/10 11:34:01 fuzzer started 2021/05/10 11:34:01 dialing manager at 10.128.0.163:34293 2021/05/10 11:34:01 syscalls: 3419 2021/05/10 11:34:01 code coverage: enabled 2021/05/10 11:34:01 comparison tracing: enabled 2021/05/10 11:34:01 extra coverage: extra coverage is not supported by the kernel 2021/05/10 11:34:01 setuid sandbox: enabled 2021/05/10 11:34:01 namespace sandbox: enabled 2021/05/10 11:34:01 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/10 11:34:01 fault injection: enabled 2021/05/10 11:34:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/10 11:34:01 net packet injection: enabled 2021/05/10 11:34:01 net device setup: enabled 2021/05/10 11:34:01 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/10 11:34:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/10 11:34:01 USB emulation: /dev/raw-gadget does not exist 2021/05/10 11:34:01 hci packet injection: enabled 2021/05/10 11:34:01 wifi device emulation: enabled 2021/05/10 11:34:01 802.15.4 emulation: enabled panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x10 pc=0x6e01c8] goroutine 1 [running]: github.com/google/syzkaller/prog.(*ChoiceTable).Enabled(...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/prio.go:239 main.(*Fuzzer).checkDisabledCalls(0xc00006c1a0, 0xc000219080) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:469 +0x68 main.(*Fuzzer).deserializeInput(0xc00006c1a0, 0xc0001c4000, 0x4f1, 0x4f1, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:460 +0x14c main.(*Fuzzer).addCandidateInput(0xc00006c1a0, 0xc0001c4000, 0x4f1, 0x4f1, 0x101) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:438 +0x4d main.(*Fuzzer).poll(0xc00006c1a0, 0xc0002f8501, 0x0, 0xc000370030) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:409 +0x4d4 main.main() /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:273 +0x1271 syzkaller login: