[ 407.160522][ T3170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 438.153516][ T3170] eql: remember to turn off Van-Jacobson compression on your slave devices Warning: Permanently added '[localhost]:40358' (ED25519) to the list of known hosts. [ 928.240103][ T25] audit: type=1400 audit(927.450:61): avc: denied { execute } for pid=3345 comm="sh" name="syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 928.271300][ T25] audit: type=1400 audit(927.490:62): avc: denied { execute_no_trans } for pid=3345 comm="sh" path="/syz-execprog" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:16:25 parsed 1 programs [ 986.251300][ T25] audit: type=1400 audit(985.460:63): avc: denied { node_bind } for pid=3345 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1015.028521][ T25] audit: type=1400 audit(1014.240:64): avc: denied { mounton } for pid=3354 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1015.078955][ T25] audit: type=1400 audit(1014.290:65): avc: denied { mount } for pid=3354 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1015.171879][ T3354] cgroup: Unknown subsys name 'net' [ 1015.258182][ T25] audit: type=1400 audit(1014.470:66): avc: denied { unmount } for pid=3354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1015.776363][ T3354] cgroup: Unknown subsys name 'cpuset' [ 1015.922218][ T3354] cgroup: Unknown subsys name 'rlimit' [ 1017.289319][ T25] audit: type=1400 audit(1016.500:67): avc: denied { setattr } for pid=3354 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1017.320453][ T25] audit: type=1400 audit(1016.540:68): avc: denied { create } for pid=3354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1017.356904][ T25] audit: type=1400 audit(1016.550:69): avc: denied { write } for pid=3354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1017.363244][ T25] audit: type=1400 audit(1016.570:70): avc: denied { module_request } for pid=3354 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1017.847219][ T25] audit: type=1400 audit(1017.060:71): avc: denied { read } for pid=3354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1017.904430][ T25] audit: type=1400 audit(1017.120:72): avc: denied { mounton } for pid=3354 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 1017.933103][ T25] audit: type=1400 audit(1017.150:73): avc: denied { mount } for pid=3354 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1019.039052][ T3358] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 1019.291287][ T3354] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1045.539156][ T25] kauditd_printk_skb: 4 callbacks suppressed [ 1045.551789][ T25] audit: type=1400 audit(1044.760:78): avc: denied { execmem } for pid=3359 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1045.893714][ T25] audit: type=1400 audit(1045.110:79): avc: denied { read } for pid=3360 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1045.926375][ T25] audit: type=1400 audit(1045.140:80): avc: denied { open } for pid=3360 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1046.027952][ T25] audit: type=1400 audit(1045.230:81): avc: denied { mounton } for pid=3360 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1047.429209][ T25] audit: type=1400 audit(1046.650:82): avc: denied { mount } for pid=3360 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1047.474084][ T25] audit: type=1400 audit(1046.690:83): avc: denied { mounton } for pid=3360 comm="syz-executor" path="/syzkaller.fUeOsU/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1047.521965][ T25] audit: type=1400 audit(1046.740:84): avc: denied { mount } for pid=3360 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1047.599277][ T25] audit: type=1400 audit(1046.820:85): avc: denied { mounton } for pid=3360 comm="syz-executor" path="/syzkaller.fUeOsU/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1047.641908][ T25] audit: type=1400 audit(1046.860:86): avc: denied { mounton } for pid=3360 comm="syz-executor" path="/syzkaller.fUeOsU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2906 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1047.761997][ T25] audit: type=1400 audit(1046.980:87): avc: denied { unmount } for pid=3360 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1048.220547][ T3360] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1060.797756][ T25] kauditd_printk_skb: 8 callbacks suppressed [ 1060.808026][ T25] audit: type=1400 audit(1060.010:96): avc: denied { module_request } for pid=3370 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1062.131735][ T25] audit: type=1400 audit(1061.350:97): avc: denied { sys_module } for pid=3370 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1077.768446][ T3370] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1077.843979][ T3370] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1083.610694][ T3370] hsr_slave_0: entered promiscuous mode [ 1083.641057][ T3370] hsr_slave_1: entered promiscuous mode [ 1087.691934][ T3370] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1087.848428][ T3370] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1087.937954][ T3370] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1088.079013][ T3370] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1094.694530][ T3370] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1117.392698][ T3370] veth0_vlan: entered promiscuous mode [ 1117.690288][ T3370] veth1_vlan: entered promiscuous mode [ 1118.581688][ T3370] veth0_macvtap: entered promiscuous mode [ 1118.840665][ T3370] veth1_macvtap: entered promiscuous mode [ 1120.089432][ T50] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.163569][ T50] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.216706][ T50] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.218579][ T50] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1126.138133][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1127.509000][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1128.680719][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1129.594148][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1146.970490][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1147.129633][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1147.226461][ T12] bond0 (unregistering): Released all slaves [ 1148.389170][ T12] hsr_slave_0: left promiscuous mode [ 1148.578462][ T12] hsr_slave_1: left promiscuous mode [ 1149.176862][ T12] veth1_macvtap: left promiscuous mode [ 1149.187265][ T12] veth0_macvtap: left promiscuous mode [ 1149.197132][ T12] veth1_vlan: left promiscuous mode [ 1149.229499][ T12] veth0_vlan: left promiscuous mode [ 1201.507939][ T25] audit: type=1401 audit(1200.720:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 1207.513262][ T25] audit: type=1400 audit(1206.730:99): avc: denied { create } for pid=3491 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1218.748221][ T25] audit: type=1400 audit(1217.960:100): avc: denied { create } for pid=3504 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1218.958876][ T25] audit: type=1400 audit(1218.150:101): avc: denied { sys_admin } for pid=3504 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1222.041850][ T25] audit: type=1400 audit(1221.260:102): avc: denied { unmount } for pid=3506 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1222.119170][ T25] audit: type=1400 audit(1221.300:103): avc: denied { sys_chroot } for pid=3506 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 1970/01/01 00:21:40 executed programs: 0 [ 1327.586641][ T3572] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1327.678511][ T3572] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1334.330594][ T3572] hsr_slave_0: entered promiscuous mode [ 1334.368728][ T3572] hsr_slave_1: entered promiscuous mode [ 1338.733271][ T3572] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1338.911977][ T3572] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1339.079158][ T3572] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1339.258094][ T3572] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1346.269927][ T3572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1376.533621][ T3572] veth0_vlan: entered promiscuous mode [ 1376.927480][ T3572] veth1_vlan: entered promiscuous mode [ 1378.749061][ T3572] veth0_macvtap: entered promiscuous mode [ 1378.989596][ T3572] veth1_macvtap: entered promiscuous mode [ 1381.116781][ T50] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1381.230874][ T50] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1381.393074][ T50] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1381.399425][ T50] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 1970/01/01 00:23:02 executed programs: 2 [ 1384.626435][ T25] audit: type=1400 audit(1383.780:104): avc: denied { read } for pid=3651 comm="syz.2.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1384.634205][ T25] audit: type=1400 audit(1383.840:105): avc: denied { open } for pid=3651 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1384.709532][ T25] audit: type=1400 audit(1383.920:106): avc: denied { ioctl } for pid=3651 comm="syz.2.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1385.351375][ T3651] FAULT_INJECTION: forcing a failure. [ 1385.351375][ T3651] name failslab, interval 1, probability 0, space 0, times 1 [ 1385.372469][ T3651] CPU: 0 UID: 0 PID: 3651 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1385.373128][ T3651] Hardware name: linux,dummy-virt (DT) [ 1385.373608][ T3651] Call trace: [ 1385.373995][ T3651] show_stack+0x2c/0x3c (C) [ 1385.375908][ T3651] __dump_stack+0x30/0x40 [ 1385.376293][ T3651] dump_stack_lvl+0xd8/0x12c [ 1385.376605][ T3651] dump_stack+0x1c/0x28 [ 1385.376886][ T3651] should_fail_ex+0x56c/0x6d8 [ 1385.377102][ T3651] should_failslab+0xb8/0xec [ 1385.377401][ T3651] __kmalloc_cache_noprof+0x8c/0x5cc [ 1385.377651][ T3651] vgic_allocate_private_irqs_locked+0x10c/0x608 [ 1385.377886][ T3651] kvm_vgic_create+0x4f4/0x964 [ 1385.378095][ T3651] vgic_create+0x58/0x78 [ 1385.378395][ T3651] kvm_ioctl_create_device+0x18c/0x710 [ 1385.378657][ T3651] kvm_vm_ioctl+0x704/0x9a4 [ 1385.378898][ T3651] __arm64_sys_ioctl+0x18c/0x244 [ 1385.379227][ T3651] invoke_syscall+0x90/0x230 [ 1385.379533][ T3651] el0_svc_common+0x120/0x2f4 [ 1385.379811][ T3651] do_el0_svc+0x58/0x74 [ 1385.380077][ T3651] el0_svc+0x5c/0x238 [ 1385.380382][ T3651] el0t_64_sync_handler+0x84/0x12c [ 1385.380670][ T3651] el0t_64_sync+0x198/0x19c [ 1385.861267][ T3651] Unable to handle kernel paging request at virtual address ffef800000000000 [ 1385.887963][ T3651] KASAN: maybe wild-memory-access in range [0xff00000000000000-0xff0000000000000f] [ 1385.906045][ T3651] Mem abort info: [ 1385.908625][ T3651] ESR = 0x0000000096000004 [ 1385.923973][ T25] audit: type=1400 audit(1385.140:107): avc: denied { read } for pid=3129 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1385.937315][ T3651] EC = 0x25: DABT (current EL), IL = 32 bits [ 1385.944554][ T3651] SET = 0, FnV = 0 [ 1385.961550][ T3651] EA = 0, S1PTW = 0 [ 1385.970424][ T3651] FSC = 0x04: level 0 translation fault [ 1386.036984][ T3651] Data abort info: [ 1386.039607][ T3651] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1386.048985][ T3651] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1386.051920][ T3651] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1386.076577][ T25] audit: type=1400 audit(1385.250:108): avc: denied { search } for pid=3129 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1386.092709][ T3651] [ffef800000000000] address between user and kernel address ranges [ 1386.119036][ T3651] Internal error: Oops: 0000000096000004 [#1] SMP [ 1386.122448][ T3651] Modules linked in: [ 1386.123754][ T3651] CPU: 0 UID: 0 PID: 3651 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT [ 1386.124939][ T3651] Hardware name: linux,dummy-virt (DT) [ 1386.126003][ T3651] pstate: 01402009 (nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 1386.127413][ T3651] pc : kvm_vgic_destroy+0x2d4/0x624 [ 1386.128399][ T3651] lr : kvm_vgic_destroy+0x290/0x624 [ 1386.129259][ T3651] sp : ffff80008e647b90 [ 1386.129991][ T3651] x29: ffff80008e647ba0 x28: 0000000000000005 x27: cdf00000200a52d8 [ 1386.131605][ T3651] x26: cdf00000200a4db0 x25: 00000000000000cd x24: cdf00000200a4d8c [ 1386.132929][ T3651] x23: 00000000000000cd x22: 00000000000000cd x21: cdf00000200a4ad0 [ 1386.134294][ T3651] x20: efff800000000000 x19: cdf00000200a4000 x18: 00000000030f4b63 [ 1386.135563][ T3651] x17: 0000000000000031 x16: 0000000000000000 x15: ffff800088209a68 [ 1386.136885][ T3651] x14: ffffffffffffffff x13: 0000000000000028 x12: 5df000001795c1f0 [ 1386.138263][ T3651] x11: ffff800088209a68 x10: 0000000000ff0100 x9 : 0ff0000000000000 [ 1386.139741][ T3651] x8 : 0000000000000000 x7 : ffff80008672f958 x6 : 0000000000000000 [ 1386.141122][ T3651] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000002 [ 1386.142500][ T3651] x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000007 [ 1386.145877][ T3651] Call trace: [ 1386.146553][ T3651] kvm_vgic_destroy+0x2d4/0x624 (P) [ 1386.147470][ T3651] kvm_arch_destroy_vm+0x88/0x138 [ 1386.148230][ T3651] kvm_put_kvm+0x778/0xbe0 [ 1386.149091][ T3651] kvm_vm_release+0x58/0x78 [ 1386.149978][ T3651] __fput+0x4ac/0x978 [ 1386.150823][ T3651] ____fput+0x20/0x58 [ 1386.151634][ T3651] task_work_run+0x1b8/0x250 [ 1386.152520][ T3651] exit_to_user_mode_loop+0x110/0x188 [ 1386.153489][ T3651] el0_svc+0x17c/0x238 [ 1386.154394][ T3651] el0t_64_sync_handler+0x84/0x12c [ 1386.155396][ T3651] el0t_64_sync+0x198/0x19c [ 1386.156797][ T3651] Code: 54000420 b2481c28 d344fd09 d378fc28 (38696a89) [ 1386.158767][ T3651] ---[ end trace 0000000000000000 ]--- [ 1386.160471][ T3651] Kernel panic - not syncing: Oops: Fatal exception [ 1386.162129][ T3651] Kernel Offset: disabled [ 1386.162738][ T3651] CPU features: 0x0000000,001a3005,fbe327a1,057ffe1f [ 1386.163559][ T3651] Memory Limit: none [ 1386.165042][ T3651] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:16:21 Registers: info registers vcpu 0 CPU#0 PC=ffff8000806a9d60 X00=0000000000000001 X01=0000000000000080 X02=c1f00000124cd280 X03=0000000000000000 X04=0000000000000001 X05=0000000000000000 X06=0000000000000000 X07=ffff8000839e6250 X08=c1f00000124cd280 X09=0000000000000000 X10=0000000000ff0100 X11=0000000000000001 X12=0000000000000000 X13=00000000000000fc X14=ffffffffffffffff X15=0000000000000073 X16=0000000000000048 X17=0000000000000048 X18=48f0000014f21e05 X19=0000000000000000 X20=fcf00000168db530 X21=000000000000000a X22=e6f000000cc1ba00 X23=0000000000000008 X24=0000000000000000 X25=0000000000000000 X26=0000000000800001 X27=00000000000000c1 X28=ffff80008795e028 X29=ffff80008eff7af0 X30=ffff80008032b058 SP=ffff80008eff7af0 PSTATE=604020c9 -ZC- EL2h SVCR=00000000 -- BTYPE=0 FPCR=00000000 FPSR=00000000 P00=0000 P01=0000 P02=0000 P03=0000 P04=0000 P05=0000 P06=0000 P07=0000 P08=0000 P09=0000 P10=0000 P11=0000 P12=0000 P13=0000 P14=0000 P15=0000 FFR=0000 Z00=372f6b636f6c622f:7665642f7379732f Z01=00323a372f6b636f:6c622f7665642f73 Z02=0000000000000000:ffffff0000000000 Z03=ffffffff00000000:ffffffff00ff0000 Z04=0000000000000000:ffff0000ffff0f00 Z05=0000000000000000:00c00000cc000000 Z06=0000000000000073:0000aaaaeb4ce3c0 Z07=0000000000000074:0000aaaaeb4cb600 Z08=0000000000000000:0000000000000000 Z09=0000000000000000:0000000000000000 Z10=0000000000000000:0000000000000000 Z11=0000000000000000:0000000000000000 Z12=0000000000000000:0000000000000000 Z13=0000000000000000:0000000000000000 Z14=0000000000000000:0000000000000000 Z15=0000000000000000:0000000000000000 Z16=0000ffffe50cbea0:0000ffffe50cbea0 Z17=ffffff80ffffffd8:0000ffffe50cbe70 Z18=0000000000000000:0000000000000000 Z19=0000000000000000:0000000000000000 Z20=0000000000000000:0000000000000000 Z21=0000000000000000:0000000000000000 Z22=0000000000000000:0000000000000000 Z23=0000000000000000:0000000000000000 Z24=0000000000000000:0000000000000000 Z25=0000000000000000:0000000000000000 Z26=0000000000000000:0000000000000000 Z27=0000000000000000:0000000000000000 Z28=0000000000000000:0000000000000000 Z29=0000000000000000:0000000000000000 Z30=0000000000000000:0000000000000000 Z31=0000000000000000:0000000000000000