[ 374.240581][ T3151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 409.039943][ T3151] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:27022' (ED25519) to the list of known hosts. [ 841.196514][ T25] audit: type=1400 audit(840.460:60): avc: denied { execute } for pid=3317 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 841.234029][ T25] audit: type=1400 audit(840.470:61): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:14:50 parsed 1 programs [ 891.797121][ T25] audit: type=1400 audit(891.060:62): avc: denied { node_bind } for pid=3317 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 912.216035][ T25] audit: type=1400 audit(911.470:63): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 912.247286][ T25] audit: type=1400 audit(911.510:64): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 912.331284][ T3325] cgroup: Unknown subsys name 'net' [ 912.380303][ T25] audit: type=1400 audit(911.640:65): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 912.769299][ T3325] cgroup: Unknown subsys name 'cpuset' [ 912.869480][ T3325] cgroup: Unknown subsys name 'rlimit' [ 914.145406][ T25] audit: type=1400 audit(913.400:66): avc: denied { setattr } for pid=3325 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 914.172011][ T25] audit: type=1400 audit(913.430:67): avc: denied { create } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 914.190999][ T25] audit: type=1400 audit(913.450:68): avc: denied { write } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 914.218408][ T25] audit: type=1400 audit(913.480:69): avc: denied { module_request } for pid=3325 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 914.731968][ T25] audit: type=1400 audit(913.990:70): avc: denied { read } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 914.789387][ T25] audit: type=1400 audit(914.050:71): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 914.812263][ T25] audit: type=1400 audit(914.070:72): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 915.992048][ T3330] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 916.211827][ T3325] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 945.521077][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 945.529658][ T25] audit: type=1400 audit(944.780:77): avc: denied { execmem } for pid=3336 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 946.092330][ T25] audit: type=1400 audit(945.350:78): avc: denied { read } for pid=3337 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 946.144985][ T25] audit: type=1400 audit(945.400:79): avc: denied { open } for pid=3337 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 946.304378][ T25] audit: type=1400 audit(945.560:80): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 949.255835][ T25] audit: type=1400 audit(948.510:81): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 949.298506][ T25] audit: type=1400 audit(948.560:82): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.v91nRp/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 949.345766][ T25] audit: type=1400 audit(948.600:83): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 949.428878][ T25] audit: type=1400 audit(948.680:84): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.v91nRp/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 949.468040][ T25] audit: type=1400 audit(948.730:85): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzkaller.v91nRp/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 949.577186][ T25] audit: type=1400 audit(948.840:86): avc: denied { unmount } for pid=3337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 950.009727][ T3337] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1015.820401][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1015.834677][ T25] audit: type=1400 audit(1015.080:95): avc: denied { sys_module } for pid=3382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1027.421049][ T3382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1027.486210][ T3382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1033.230184][ T3382] hsr_slave_0: entered promiscuous mode [ 1033.249701][ T3382] hsr_slave_1: entered promiscuous mode [ 1036.818734][ T3382] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1036.938793][ T3382] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1037.029856][ T3382] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1037.106924][ T3382] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1043.571727][ T3382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1070.130050][ T3382] veth0_vlan: entered promiscuous mode [ 1070.466177][ T3382] veth1_vlan: entered promiscuous mode [ 1071.921352][ T3382] veth0_macvtap: entered promiscuous mode [ 1072.205822][ T3382] veth1_macvtap: entered promiscuous mode [ 1073.590359][ T21] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.639720][ T21] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.649048][ T21] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1073.668466][ T21] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.435241][ T3296] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1080.108920][ T25] audit: type=1400 audit(1079.370:96): avc: denied { create } for pid=3461 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1080.331140][ T25] audit: type=1400 audit(1079.550:97): avc: denied { sys_admin } for pid=3461 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1080.370039][ T3296] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1081.317592][ T3296] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1081.770276][ T3296] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1085.015550][ T25] audit: type=1400 audit(1084.260:98): avc: denied { sys_chroot } for pid=3462 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1092.276870][ T3296] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1092.399287][ T3296] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1092.461654][ T3296] bond0 (unregistering): Released all slaves [ 1093.344782][ T3296] hsr_slave_0: left promiscuous mode [ 1093.377155][ T3296] hsr_slave_1: left promiscuous mode [ 1093.717385][ T3296] veth1_macvtap: left promiscuous mode [ 1093.722175][ T3296] veth0_macvtap: left promiscuous mode [ 1093.747566][ T3296] veth1_vlan: left promiscuous mode [ 1093.774375][ T3296] veth0_vlan: left promiscuous mode [ 1106.464736][ T25] audit: type=1401 audit(1105.720:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1118.753923][ T25] audit: type=1400 audit(1118.010:100): avc: denied { create } for pid=3484 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 1970/01/01 00:19:02 executed programs: 0 [ 1174.331836][ T3505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1174.489346][ T3505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1190.330948][ T3505] hsr_slave_0: entered promiscuous mode [ 1190.399632][ T3505] hsr_slave_1: entered promiscuous mode [ 1201.350429][ T3505] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1201.781836][ T3505] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1202.065464][ T3505] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1202.267531][ T3505] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1215.408690][ T3505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1242.752330][ T3505] veth0_vlan: entered promiscuous mode [ 1243.085502][ T3505] veth1_vlan: entered promiscuous mode [ 1243.952371][ T3505] veth0_macvtap: entered promiscuous mode [ 1244.071244][ T3505] veth1_macvtap: entered promiscuous mode [ 1245.388380][ T21] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1245.408042][ T3449] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1245.428550][ T3449] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1245.494807][ T3449] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:20:46 executed programs: 2 [ 1248.678772][ T25] audit: type=1400 audit(1247.910:101): avc: denied { read } for pid=3622 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1248.729683][ T25] audit: type=1400 audit(1247.990:102): avc: denied { open } for pid=3622 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1248.791857][ T25] audit: type=1400 audit(1248.050:103): avc: denied { ioctl } for pid=3622 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1248.881933][ C0] Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000005a000000 -- HVC (AArch64) [ 1248.883211][ C0] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1248.883739][ C0] Hardware name: linux,dummy-virt (DT) [ 1248.884235][ C0] pstate: 81402009 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1248.884603][ C0] pc : pkvm_init_host_vm+0xb8/0x160 [ 1248.886221][ C0] lr : pkvm_init_host_vm+0xa0/0x160 [ 1248.886419][ C0] sp : ffff80008e837c60 [ 1248.886538][ C0] x29: ffff80008e837c60 x28: 13f0000013178518 x27: ffff800087354000 [ 1248.887112][ C0] x26: e3f000000d2a5c10 x25: 00000000000000f0 x24: 00000000000014f8 [ 1248.887442][ C0] x23: 00000000000000f0 x22: f0ff80008c4ce260 x21: f0ff80008c4cdff0 [ 1248.887734][ C0] x20: 0000000000000000 x19: efff800000000000 x18: fff0000072d86400 [ 1248.888020][ C0] x17: 00000000000000bd x16: ffff800080011d9c x15: 00000000000000fe [ 1248.888337][ C0] x14: ffffffffffffffff x13: 00000000000000bd x12: ffff7c1ffbf7f0c2 [ 1248.888627][ C0] x11: 0000000000000100 x10: 0000000000ff0100 x9 : 0000000000000000 [ 1248.889003][ C0] x8 : 13f0000013178000 x7 : ffff800080aba4c0 x6 : 0000000000000000 [ 1248.889329][ C0] x5 : 0000000000000001 x4 : ffff80008e837ac0 x3 : 0000000000000004 [ 1248.889613][ C0] x2 : 0000000000013c20 x1 : 0000000000000000 x0 : 00000000c600001b [ 1248.890446][ C0] Kernel panic - not syncing: Unhandled exception [ 1248.908256][ C0] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1248.909767][ C0] Hardware name: linux,dummy-virt (DT) [ 1248.910782][ C0] Call trace: [ 1248.911778][ C0] show_stack+0x2c/0x3c (C) [ 1248.914940][ C0] __dump_stack+0x30/0x40 [ 1248.915871][ C0] dump_stack_lvl+0x30/0x12c [ 1248.916772][ C0] dump_stack+0x1c/0x28 [ 1248.917574][ C0] vpanic+0x22c/0x59c [ 1248.918411][ C0] vpanic+0x0/0x59c [ 1248.919195][ C0] el1t_64_irq_handler+0x0/0x1c [ 1248.920119][ C0] el1_abort+0x0/0x5c [ 1248.920870][ C0] el1h_64_sync+0x6c/0x70 [ 1248.921886][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1248.922827][ C0] kvm_arch_init_vm+0x150/0x288 [ 1248.923740][ C0] kvm_dev_ioctl+0x838/0x105c [ 1248.924671][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1248.925713][ C0] invoke_syscall+0x90/0x2b4 [ 1248.926694][ C0] el0_svc_common+0x180/0x2f4 [ 1248.927656][ C0] do_el0_svc+0x58/0x74 [ 1248.928561][ C0] el0_svc+0x58/0x164 [ 1248.929381][ C0] el0t_64_sync_handler+0x84/0x12c [ 1248.930288][ C0] el0t_64_sync+0x198/0x19c [ 1248.932280][ C0] Kernel Offset: disabled [ 1248.933014][ C0] CPU features: 0x00000,000068c0,17de33e1,057ffe1f [ 1248.934059][ C0] Memory Limit: none [ 1248.935093][ C0] [ 1248.935657][ C0] ================================ [ 1248.936436][ C0] WARNING: inconsistent lock state [ 1248.937311][ C0] syzkaller #0 Not tainted [ 1248.938204][ C0] -------------------------------- [ 1248.938964][ C0] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 1248.939936][ C0] syz.2.17/3622 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 1248.940870][ C0] 8df000000d3ed6e8 (&k->list_lock){+.+.}-{3:3}, at: bus_for_each_dev+0x60/0x2a4 [ 1248.943201][ C0] {INITIAL USE} state was registered at: [ 1248.944149][ C0] lock_acquire+0x14c/0x2e0 [ 1248.945214][ C0] _raw_spin_lock+0x48/0x60 [ 1248.946103][ C0] kobject_add_internal+0x46c/0xee4 [ 1248.947024][ C0] kobject_add+0x10c/0x1d0 [ 1248.947889][ C0] device_add+0x494/0xd78 [ 1248.948741][ C0] device_register+0x28/0x38 [ 1248.949645][ C0] faux_bus_init+0x1c/0x88 [ 1248.950557][ C0] driver_init+0x30/0x58 [ 1248.951387][ C0] do_basic_setup+0x1c/0xa8 [ 1248.952257][ C0] kernel_init_freeable+0x244/0x330 [ 1248.953183][ C0] kernel_init+0x24/0x1d0 [ 1248.954021][ C0] ret_from_fork+0x10/0x20 [ 1248.954947][ C0] irq event stamp: 1574 [ 1248.955666][ C0] hardirqs last enabled at (1573): [] _raw_spin_unlock_irqrestore+0x44/0xbc [ 1248.957056][ C0] hardirqs last disabled at (1574): [] __panic_unhandled+0x24/0x68 [ 1248.958515][ C0] softirqs last enabled at (1516): [] handle_softirqs+0xb8c/0xd08 [ 1248.959919][ C0] softirqs last disabled at (1503): [] __do_softirq+0x14/0x20 [ 1248.961324][ C0] [ 1248.961324][ C0] other info that might help us debug this: [ 1248.962457][ C0] Possible unsafe locking scenario: [ 1248.962457][ C0] [ 1248.963410][ C0] CPU0 [ 1248.963985][ C0] ---- [ 1248.964591][ C0] lock(&k->list_lock); [ 1248.965521][ C0] [ 1248.966156][ C0] lock(&k->list_lock); [ 1248.967057][ C0] [ 1248.967057][ C0] *** DEADLOCK *** [ 1248.967057][ C0] [ 1248.968193][ C0] no locks held by syz.2.17/3622. [ 1248.968985][ C0] [ 1248.968985][ C0] stack backtrace: [ 1248.969900][ C0] CPU: 0 UID: 0 PID: 3622 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1248.971180][ C0] Hardware name: linux,dummy-virt (DT) [ 1248.971980][ C0] Call trace: [ 1248.972546][ C0] show_stack+0x2c/0x3c (C) [ 1248.973453][ C0] __dump_stack+0x30/0x40 [ 1248.974282][ C0] dump_stack_lvl+0x30/0x12c [ 1248.975165][ C0] dump_stack+0x1c/0x28 [ 1248.975963][ C0] print_usage_bug+0x2f4/0x32c [ 1248.976877][ C0] verify_lock_unused+0x78/0x88 [ 1248.977854][ C0] lock_acquire+0x22c/0x2e0 [ 1248.978800][ C0] _raw_spin_lock+0x48/0x60 [ 1248.979650][ C0] bus_for_each_dev+0x60/0x2a4 [ 1248.980612][ C0] coresight_panic_cb+0x2c/0x3c [ 1248.981584][ C0] notifier_call_chain+0x1e8/0x65c [ 1248.982666][ C0] atomic_notifier_call_chain+0xd0/0x180 [ 1248.983724][ C0] vpanic+0x2c4/0x59c [ 1248.984443][ C0] vpanic+0x0/0x59c [ 1248.985212][ C0] el1t_64_irq_handler+0x0/0x1c [ 1248.986061][ C0] el1_abort+0x0/0x5c [ 1248.986843][ C0] el1h_64_sync+0x6c/0x70 [ 1248.987662][ C0] pkvm_init_host_vm+0xb8/0x160 (P) [ 1248.988588][ C0] kvm_arch_init_vm+0x150/0x288 [ 1248.989453][ C0] kvm_dev_ioctl+0x838/0x105c [ 1248.990371][ C0] __arm64_sys_ioctl+0x18c/0x244 [ 1248.991309][ C0] invoke_syscall+0x90/0x2b4 [ 1248.992219][ C0] el0_svc_common+0x180/0x2f4 [ 1248.993188][ C0] do_el0_svc+0x58/0x74 [ 1248.994061][ C0] el0_svc+0x58/0x164 [ 1248.994848][ C0] el0t_64_sync_handler+0x84/0x12c [ 1248.995725][ C0] el0t_64_sync+0x198/0x19c [ 1248.997900][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:24:01 Registers: info registers vcpu 0 CPU#0 PC=ffff800082127694 X00=0000000000000003 X01=0000000000000002 X02=0000000000000060 X03=ffff800082127590 X04=0000000000000001 X05=0000000000000000 X06=ffff800081f0e734 X07=ffff800087cd0c24 X08=13f0000013178000 X09=0000000000110001 X10=0000000000ff0100 X11=00000000000000fe X12=00000000000000eb X13=0000000000000007 X14=0000000000110001 X15=0000000000000000 X16=00000000000000fe X17=00000000000000bd X18=fff0000072d86400 X19=efff800000000000 X20=ebf000000dcb0880 X21=82ff80008c43b018 X22=0000000000000002 X23=ebf000000dcb097c X24=00000000000000eb X25=ebf000000dcb0ac8 X26=ebf000000dcb08c8 X27=00000000000000eb X28=00000000000000eb X29=ffff80008e8373f0 X30=ffff800082127694 SP=ffff80008e8373e0 PSTATE=004023c9 ---- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=2525252525252525:2525252525252525 Z01=000000756c6c2570:6f6f6c2f7665642f Z02=0000000000000000:ffffffff00000000 Z03=ffffff000000ff00:0000000000000000 Z04=0000000000000000:fff000f000000000 Z05=bb448243222c92da:e3914ed4e87380b0 Z06=6edc4d3a2914b135:d8e9c869e2695c88 Z07=b20fae707afde253:388e9c6c4fa85ca0 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffca2afad0:0000ffffca2afad0 Z17=ffffff80ffffffd0:0000ffffca2afaa0 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000