[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.166' (ECDSA) to the list of known hosts. 2021/05/10 11:33:50 fuzzer started 2021/05/10 11:33:51 dialing manager at 10.128.0.163:34293 2021/05/10 11:33:51 syscalls: 3419 2021/05/10 11:33:51 code coverage: enabled 2021/05/10 11:33:51 comparison tracing: enabled 2021/05/10 11:33:51 extra coverage: extra coverage is not supported by the kernel 2021/05/10 11:33:51 setuid sandbox: enabled 2021/05/10 11:33:51 namespace sandbox: enabled 2021/05/10 11:33:51 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/10 11:33:51 fault injection: enabled 2021/05/10 11:33:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/10 11:33:51 net packet injection: enabled 2021/05/10 11:33:51 net device setup: enabled 2021/05/10 11:33:51 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/10 11:33:51 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/10 11:33:51 USB emulation: /dev/raw-gadget does not exist 2021/05/10 11:33:51 hci packet injection: enabled 2021/05/10 11:33:51 wifi device emulation: enabled 2021/05/10 11:33:51 802.15.4 emulation: enabled panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x10 pc=0x6e01c8] goroutine 1 [running]: github.com/google/syzkaller/prog.(*ChoiceTable).Enabled(...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/prio.go:239 main.(*Fuzzer).checkDisabledCalls(0xc00009a340, 0xc000171080) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:469 +0x68 main.(*Fuzzer).deserializeInput(0xc00009a340, 0xc0001fc2c0, 0x299, 0x299, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:460 +0x14c main.(*Fuzzer).addCandidateInput(0xc00009a340, 0xc0001fc2c0, 0x299, 0x299, 0x101) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:438 +0x4d main.(*Fuzzer).poll(0xc00009a340, 0xc000170701, 0x0, 0xc0001da1c0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:409 +0x4d4 main.main() /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:273 +0x1271 syzkaller login: