Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2021/05/10 11:50:56 fuzzer started 2021/05/10 11:50:56 dialing manager at 10.128.0.163:40723 2021/05/10 11:50:57 syscalls: 3399 2021/05/10 11:50:57 code coverage: enabled 2021/05/10 11:50:57 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2021/05/10 11:50:57 extra coverage: extra coverage is not supported by the kernel 2021/05/10 11:50:57 setuid sandbox: enabled 2021/05/10 11:50:57 namespace sandbox: enabled 2021/05/10 11:50:57 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/10 11:50:57 fault injection: enabled 2021/05/10 11:50:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/10 11:50:57 net packet injection: enabled 2021/05/10 11:50:57 net device setup: enabled 2021/05/10 11:50:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/10 11:50:57 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/10 11:50:57 USB emulation: /dev/raw-gadget does not exist 2021/05/10 11:50:57 hci packet injection: enabled 2021/05/10 11:50:57 wifi device emulation: kernel 4.17 required (have 4.14.232-syzkaller) 2021/05/10 11:50:57 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x10 pc=0x6e01c8] goroutine 1 [running]: github.com/google/syzkaller/prog.(*ChoiceTable).Enabled(...) /syzkaller/gopath/src/github.com/google/syzkaller/prog/prio.go:239 main.(*Fuzzer).checkDisabledCalls(0xc00007e340, 0xc0000af540) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:469 +0x68 main.(*Fuzzer).deserializeInput(0xc00007e340, 0xc000060700, 0x3e, 0x3e, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:460 +0x14c main.(*Fuzzer).addCandidateInput(0xc00007e340, 0xc000060700, 0x3e, 0x3e, 0x101) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:438 +0x4d main.(*Fuzzer).poll(0xc00007e340, 0xc0000ae701, 0x0, 0xc0000146c0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:409 +0x4d4 main.main() /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:273 +0x1271 syzkaller login: