Starting Update UTMP about System Runlevel Changes... Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2021/05/10 11:33:21 fuzzer started 2021/05/10 11:33:21 dialing manager at 10.128.0.163:40723 2021/05/10 11:33:21 syscalls: 3399 2021/05/10 11:33:21 code coverage: enabled 2021/05/10 11:33:21 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2021/05/10 11:33:21 extra coverage: extra coverage is not supported by the kernel 2021/05/10 11:33:21 setuid sandbox: enabled 2021/05/10 11:33:21 namespace sandbox: enabled 2021/05/10 11:33:21 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/10 11:33:21 fault injection: enabled 2021/05/10 11:33:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/10 11:33:21 net packet injection: enabled 2021/05/10 11:33:21 net device setup: enabled 2021/05/10 11:33:21 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/10 11:33:21 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/10 11:33:21 USB emulation: /dev/raw-gadget does not exist 2021/05/10 11:33:21 hci packet injection: enabled 2021/05/10 11:33:21 wifi device emulation: kernel 4.17 required (have 4.14.232-syzkaller) 2021/05/10 11:33:21 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x10 pc=0x6e01c8] goroutine 1 [running]: github.com/google/syzkaller/prog.(*ChoiceTable).Enabled(...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/prio.go:239 main.(*Fuzzer).checkDisabledCalls(0xc000302ea0, 0xc0004fd600) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:469 +0x68 main.(*Fuzzer).deserializeInput(0xc000302ea0, 0xc000252000, 0x153, 0x153, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:460 +0x14c main.(*Fuzzer).addCandidateInput(0xc000302ea0, 0xc000252000, 0x153, 0x153, 0x101) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:438 +0x4d main.(*Fuzzer).poll(0xc000302ea0, 0xc0004fcc01, 0x0, 0xc000014990) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:409 +0x4d4 main.main() /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:273 +0x1271 syzkaller login: