[ OK ] Started Regular background program processing daemon. Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions.[ 51.736046][ T6516] sshd (6516) used greatest stack depth: 23256 bytes left [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.52' (ECDSA) to the list of known hosts. 2020/09/08 02:45:24 fuzzer started 2020/09/08 02:45:25 dialing manager at 10.128.0.26:33245 2020/09/08 02:45:25 syscalls: 3331 2020/09/08 02:45:25 code coverage: enabled 2020/09/08 02:45:25 comparison tracing: enabled 2020/09/08 02:45:25 extra coverage: enabled 2020/09/08 02:45:25 setuid sandbox: enabled 2020/09/08 02:45:25 namespace sandbox: enabled 2020/09/08 02:45:25 Android sandbox: enabled 2020/09/08 02:45:25 fault injection: enabled 2020/09/08 02:45:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/08 02:45:25 net packet injection: enabled 2020/09/08 02:45:25 net device setup: enabled 2020/09/08 02:45:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/08 02:45:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/08 02:45:25 USB emulation: enabled 2020/09/08 02:45:25 hci packet injection: enabled syzkaller login: [ 218.186657][ C0] WARNING: can't access registers at asm_sysvec_call_function_single+0x12/0x20