[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Load/Save RF Kill Switch Status.
[  OK  ] Started Update UTMP about System Runlevel Changes.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.145' (ECDSA) to the list of known hosts.
2021/05/10 11:33:01 fuzzer started
2021/05/10 11:33:01 dialing manager at 10.128.0.163:34293
2021/05/10 11:33:01 syscalls: 3419
2021/05/10 11:33:01 code coverage: enabled
2021/05/10 11:33:01 comparison tracing: enabled
2021/05/10 11:33:01 extra coverage: extra coverage is not supported by the kernel
2021/05/10 11:33:01 setuid sandbox: enabled
2021/05/10 11:33:01 namespace sandbox: enabled
2021/05/10 11:33:01 Android sandbox: /sys/fs/selinux/policy does not exist
2021/05/10 11:33:01 fault injection: enabled
2021/05/10 11:33:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2021/05/10 11:33:01 net packet injection: enabled
2021/05/10 11:33:01 net device setup: enabled
2021/05/10 11:33:01 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2021/05/10 11:33:01 devlink PCI setup: PCI device 0000:00:10.0 is not available
2021/05/10 11:33:01 USB emulation: /dev/raw-gadget does not exist
2021/05/10 11:33:01 hci packet injection: enabled
2021/05/10 11:33:01 wifi device emulation: enabled
2021/05/10 11:33:01 802.15.4 emulation: enabled
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x10 pc=0x6e01c8]

goroutine 1 [running]:
github.com/google/syzkaller/prog.(*ChoiceTable).Enabled(...)
	/syzkaller/gopath/src/github.com/google/syzkaller/prog/prio.go:239
main.(*Fuzzer).checkDisabledCalls(0xc0002f44e0, 0xc0003a2a40)
	/syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:469 +0x68
main.(*Fuzzer).deserializeInput(0xc0002f44e0, 0xc0002fe000, 0x32a, 0x32a, 0x0)
	/syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:460 +0x14c
main.(*Fuzzer).addCandidateInput(0xc0002f44e0, 0xc0002fe000, 0x32a, 0x32a, 0x101)
	/syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:438 +0x4d
main.(*Fuzzer).poll(0xc0002f44e0, 0xc000504501, 0x0, 0xc0005bc230)
	/syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:409 +0x4d4
main.main()
	/syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:273 +0x1271
syzkaller login: