Bug#966477: WARNING: at net/ipv4/tcp_input.c:2799 tcp_fastretrans_alert

2020-07-28 Thread Aidan Gauland
Package: src:linux
Version: 4.19.118-2+deb10u1
Severity: normal

Dear Maintainer,

During my semi-regular auditing of the system log, I noticed the below
warning
and stack trace.  I have no idea what may have caused it, and the system has
been operating normally for weeks (continuous uptime) and appears to
still be
operating normally.

Regards,
Aidan Gauland

Note: Some sensitive apparmor audit lines have been removed from the
kernel log here.

-- Package-specific info:
** Version:
Linux version 4.19.0-9-amd64 (debian-kernel@lists.debian.org) (gcc
version 8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.118-2+deb10u1
(2020-06-07)

** Command line:
BOOT_IMAGE=/BOOT/debian@/vmlinuz-4.19.0-9-amd64 root=ZFS=/ROOT/debian ro
root=ZFS=rpool/ROOT/debian quiet

** Tainted: PWOE (12801)
 * Proprietary module has been loaded.
 * Taint on warning.
 * Out-of-tree module has been loaded.
 * Unsigned module has been loaded.

** Kernel log:
[2513851.122581] kauditd_printk_skb: 10 callbacks suppressed
[2693086.705995] [ cut here ]
[2693086.706047] WARNING: CPU: 3 PID: 0 at net/ipv4/tcp_input.c:2799
tcp_fastretrans_alert.cold.86+0x19/0x74
[2693086.706049] Modules linked in: nft_reject_inet nft_reject nft_log
nft_ct rpcsec_gss_krb5 nf_tables_set nf_log_ipv6 ip6_tables ip6t_REJECT
nf_reject_ipv6 nf_log_ipv4 nf_log_common nft_limit nft_counter xt_LOG
xt_limit xt_comment xt_tcpudp ipt_REJECT nf_reject_ipv4 xt_conntrack
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c crc32c_generic
nft_compat nf_tables nfnetlink nls_ascii nls_cp437 vfat fat intel_rapl
sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel
ipmi_ssif kvm ast ttm irqbypass drm_kms_helper crct10dif_pclmul
crc32_pclmul ghash_clmulni_intel intel_cstate mxm_wmi drm sg evdev
joydev intel_uncore mei_me efi_pstore ipmi_si mei intel_rapl_perf pcspkr
efivars pcc_cpufreq iTCO_wdt ipmi_devintf iTCO_vendor_support
intel_pch_thermal ioatdma ipmi_msghandler wmi button acpi_pad
[2693086.706102]  nfsd auth_rpcgss nfs_acl lockd grace sunrpc efivarfs
ip_tables x_tables autofs4 zfs(POE) zunicode(POE) zlua(POE) zavl(POE)
icp(POE) zcommon(POE) znvpair(POE) spl(OE) hid_generic usbhid hid sd_mod
crc32c_intel ahci xhci_pci libahci ehci_pci xhci_hcd ehci_hcd libata
ixgbe aesni_intel scsi_mod igb usbcore aes_x86_64 crypto_simd cryptd
glue_helper lpc_ich i2c_i801 i2c_algo_bit mfd_core dca usb_common mdio
[2693086.706142] CPU: 3 PID: 0 Comm: swapper/3 Tainted: P    W 
OE 4.19.0-9-amd64 #1 Debian 4.19.118-2+deb10u1
[2693086.706144] Hardware name: Supermicro Super
Server/X10SDV-4C+-TLN4F, BIOS 2.1 11/22/2019
[2693086.706150] RIP: 0010:tcp_fastretrans_alert.cold.86+0x19/0x74
[2693086.706154] Code: c7 48 f0 c3 96 e8 5a a8 a8 ff 0f 0b e9 ea ad ff
ff 48 c7 c7 48 f0 c3 96 48 89 4c 24 10 44 89 4c 24 08 89 14 24 e8 3a a8
a8 ff <0f> 0b 8b 14 24 44 8b 4c 24 08 48 8b 4c 24 10 e9 a9 b2 ff ff 48 c7
[2693086.706157] RSP: 0018:93d39fac3b10 EFLAGS: 00010246
[2693086.706160] RAX: 0024 RBX: 93d374724400 RCX:

[2693086.706163] RDX:  RSI: 00f6 RDI:
0300
[2693086.706165] RBP:  R08: 0011c6ad R09:
0004
[2693086.706166] R10:  R11: 0001 R12:
0001
[2693086.706168] R13: 93d39fac3ba8 R14:  R15:
0001
[2693086.706172] FS:  () GS:93d39fac()
knlGS:
[2693086.706174] CS:  0010 DS:  ES:  CR0: 80050033
[2693086.706176] CR2: 7f014aa2b000 CR3: 0007e840a001 CR4:
003606e0
[2693086.706179] DR0:  DR1:  DR2:

[2693086.706181] DR3:  DR6: fffe0ff0 DR7:
0400
[2693086.706182] Call Trace:
[2693086.706186]  
[2693086.706194]  tcp_ack+0x95d/0x1120
[2693086.706202]  ? sched_clock+0x5/0x10
[2693086.706208]  ? tcp_write_xmit+0x3cf/0x1000
[2693086.706214]  tcp_rcv_established+0x327/0x650
[2693086.706219]  tcp_v4_do_rcv+0x12a/0x1e0
[2693086.706223]  tcp_v4_rcv+0xb1a/0xc20
[2693086.706240]  ? nft_do_chain_inet+0x8a/0x100 [nf_tables]
[2693086.706248]  ip_local_deliver_finish+0x63/0x1e0
[2693086.706253]  ip_local_deliver+0xe0/0xf0
[2693086.706258]  ? ip_sublist_rcv_finish+0x80/0x80
[2693086.706263]  ip_rcv+0xbc/0xd0
[2693086.706268]  ? ip_rcv_finish_core.isra.18+0x360/0x360
[2693086.706275]  __netif_receive_skb_one_core+0x52/0x70
[2693086.706280]  netif_receive_skb_internal+0x2f/0xa0
[2693086.706285]  napi_gro_receive+0xba/0xe0
[2693086.706303]  igb_poll+0x481/0xeb0 [igb]
[2693086.706310]  net_rx_action+0x149/0x3b0
[2693086.706318]  __do_softirq+0xde/0x2d8
[2693086.706325]  irq_exit+0xba/0xc0
[2693086.706330]  do_IRQ+0x7f/0xe0
[2693086.706335]  common_interrupt+0xf/0xf
[2693086.706337]  
[2693086.706342] RIP: 0010:cpuidle_enter_state+0xb9/0x320
[2693086.706345] Code: e8 dc c0 b0 ff 80 7c 24 0b 00 74 17 9c 58 0f 1f
44 00 00 f6 c4 02 0f 85 3b 02 00 00 31 ff e8 ae b0 b6 

Re: Next Kernel update for Buster

2020-07-28 Thread Nicholas D Steeves
vincent.deb...@free.fr writes:

> On 2020-07-28T17:47+0200, gianluca wrote:
>>On 7/28/20 3:35 PM, Salvatore Bonaccorso wrote:

Have a look at: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/nilfs2?h=v4.19.129=1b6f42200b8313d3895c26f6553bbc8380bf1c35

>>>The next point release for buster (10.5) will contain an update of
>>>src:linux to 4.19.132, see
>>>https://lists.debian.org/debian-stable-announce/2020/07/msg1.html
>>
>>that's a very good news to know. What about timeline for 10.5??
>>;-)
>
> It should be available on Saturday August 1st.

Gianluca, P.S. if you're interested in participating in testing packages
queued for the next point release, see

  https://www.debian.org/releases/proposed-updates

If you're exclusively interested in testing kernel proposed-updates,
then you can use APT pinning to configure this:

  https://wiki.debian.org/AptConfiguration

To get this effect I'd add a rule to pin proposed-updates to a lower
priority than stable, stable-updates, and debian-security, and then add
a rule to make kernel-related packages from proposed-updates evaluate to
a higher priority.  There might be better ways, and this is just the
method I'd use ;-)


Cheers,
Nicholas


signature.asc
Description: PGP signature


Bug#966459: linux: traffic class socket options (both IPv4/IPv6) inconsistent with docs/standards

2020-07-28 Thread Thorsten Glaser
Package: src:linux
Version: 5.7.6-1
Severity: normal
Tags: upstream
X-Debbugs-Cc: t...@mirbsd.de

I’m using setsockopt to set the traffic class on sending and receive
it in control messages on receiving, for both IPv4 and IPv6.

The relevant documentation is the ip(7) manpage and, because the ipv6(7)
manpage doesn’t contain it, RFC3542.


For the receiving side, the corresponding socket options are:

• IPPROTO_IP ⇒ IP_RECVTOS, with an int argument 1 (as in the manpage)
• IPPROTO_IPV6 ⇒ IPV6_TCLASS, with an int argument 1 (as in the RFC)

The receiving CMSG is then supposed to contain the traffic class octet
as first byte in the corresponding CMSG_DATA:

   IP_RECVTOS (since Linux 2.2)
  If enabled, the IP_TOS ancillary message is passed with incoming
  packets.   It  contains  a byte which specifies the Type of Ser‐
  vice/Precedence field of the packet header.

… and…

   In the cmsghdr structure containing this ancillary data, the
   cmsg_level member will be IPPROTO_IPV6, the cmsg_type member will be
   IPV6_TCLASS, and the first byte of cmsg_data[] will be the first byte
   of the integer traffic class.

However, Linux has net/ipv6/datagram.c…

int tclass = ipv6_get_dsfield(ipv6_hdr(skb));
put_cmsg(msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), );

… and net/ipv6/ipv6_sockglue.c…

int tclass = (int)ip6_tclass(np->rcv_flowinfo);
put_cmsg(, SOL_IPV6, IPV6_TCLASS, 
sizeof(tclass), );

… both setting them as int, breaking standards/documentation-compliant
code on all big endian platforms. Same in net/ipv4/ip_sockglue.c…

int tos = inet->rcv_tos;
put_cmsg(, SOL_IP, IP_TOS, sizeof(tos), );
… in one place, but…

put_cmsg(msg, SOL_IP, IP_TOS, 1, _hdr(skb)->tos);

… in ip_cmsg_recv_tos(), yielding inconsistent results for IPv4(!).


For the sending side, we use:

• IPPROTO_IP, IP_TOS, with an argument…
• IPPROTO_IPV6, IPV6_TCLASS, with an argument…

This is funny. The documentation says to use a byte for IPv4…

   IP_TOS (since Linux 1.0)
  Set or receive the Type-Of-Service (TOS) field that is sent with
  every IP packet originating from this socket.   It  is  used  to
  prioritize  packets  on  the network.  TOS is a byte.  There are

… and setsockopt works with a byte argument, but for IPv6, using a
byte causes EINVAL (but this is because RFC3542 says int, overriding
the itojun draft which said byte).

Looking at the kernel code, IP_TOS indeed reads a byte if the size
given is less than 4, an int otherwise… except bpf_setsockopt, which
expects an int. OK, should be no problem for my userspace code.
IPV6_TCLASS always expects an int. Unexpected but apparently okay
wrt. the documentation.


tl;dr: Receiving traffic class values from IP traffic is broken on
big endian platforms.

I place the following suggestion for discussion, to achieve maximum
portability: put 4 bytes into the CMSG for both IPv4 and IPv6, where
the first and fourth byte are, identically, traffic class, second and
third 0.

Please forward this upstream. Thanks!



-- Package-specific info:
** Version:
Linux version 5.7.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 9.3.0 
(Debian 9.3.0-14), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.6-1 
(2020-06-24)

** Command line:
BOOT_IMAGE=/vmlinuz-5.7.0-1-amd64 root=/dev/sda4 ro rootdelay=5 syscall.x32=y 
vsyscall=emulate net.ifnames=0 kaslr pcie_aspm=force consoleblank=0

** Tainted: W (512)
 * kernel issued warning

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: LENOVO
product_name: 7673AG4
product_version: ThinkPad X61
chassis_vendor: LENOVO
chassis_version: Not Available
bios_vendor: LENOVO
bios_version: 7NET30WW (1.11 )
board_vendor: LENOVO
board_name: 7673AG4
board_version: Not Available

** Loaded modules:
ufs
hfs
dm_mod
loop
netlink_diag
snd_seq_dummy
cdc_acm
ctr
aes_generic
libaes
crypto_simd
cryptd
glue_helper
ccm
cpufreq_conservative
cpufreq_userspace
cpufreq_powersave
binfmt_misc
nft_counter
nft_chain_nat
xt_MASQUERADE
nf_nat
nf_conntrack
nf_defrag_ipv6
nf_defrag_ipv4
libcrc32c
nft_compat
nf_tables
x_tables
nfnetlink
tun
snd_seq_midi
snd_seq_midi_event
snd_rawmidi
snd_seq
snd_seq_device
snd_hda_codec_analog
snd_hda_codec_generic
ppdev
iwl4965
coretemp
snd_hda_intel
iwlegacy
kvm_intel
snd_intel_dspcfg
pcmcia
kvm
snd_hda_codec
mac80211
snd_hda_core
snd_hwdep
snd_pcm_oss
irqbypass
snd_mixer_oss
cfg80211
serio_raw
pcspkr
snd_pcm
sg
iTCO_wdt
yenta_socket
iTCO_vendor_support
thinkpad_acpi
pcmcia_rsrc
watchdog
pcmcia_core
snd_timer
libarc4
nvram
ledtrig_audio
snd
soundcore
ac
rfkill
parport_pc
evdev
parport
button
acpi_cpufreq
ext4
crc16
mbcache
jbd2
crc32c_generic
sd_mod
t10_pi
crc_t10dif
crct10dif_generic
crct10dif_common
ata_generic
i915
ata_piix
sdhci_pci
i2c_algo_bit
ahci

Re: Next Kernel update for Buster

2020-07-28 Thread vincent . debian

On 2020-07-28T17:47+0200, gianluca wrote:

On 7/28/20 3:35 PM, Salvatore Bonaccorso wrote:


Have a look at: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/nilfs2?h=v4.19.129=1b6f42200b8313d3895c26f6553bbc8380bf1c35


The next point release for buster (10.5) will contain an update of
src:linux to 4.19.132, see
https://lists.debian.org/debian-stable-announce/2020/07/msg1.html


that's a very good news to know. What about timeline for 10.5??
;-)


It should be available on Saturday August 1st.


signature.asc
Description: PGP signature


Re: Next Kernel update for Buster

2020-07-28 Thread gianluca

On 7/28/20 3:35 PM, Salvatore Bonaccorso wrote:


Have a look at: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/nilfs2?h=v4.19.129=1b6f42200b8313d3895c26f6553bbc8380bf1c35


The next point release for buster (10.5) will contain an update of
src:linux to 4.19.132, see
https://lists.debian.org/debian-stable-announce/2020/07/msg1.html


that's a very good news to know. What about timeline for 10.5??
;-)

Regards,
--
Eurek s.r.l.  |
Electronic Engineering| http://www.eurek.it
via Celletta 8/B, 40026 Imola, Italy  | Phone: +39-(0)542-609120
p.iva 00690621206 - c.f. 04020030377  | Fax:   +39-(0)542-609212



Re: Next Kernel update for Buster

2020-07-28 Thread Salvatore Bonaccorso
Ciao Gianluca,

On Tue, Jul 28, 2020 at 02:58:53PM +0200, gianluca wrote:
> Hello,
> I was wondering if there is any chance to have a better kernel from the
> 4.19.129 or greater.
> 
> I am asking this, mainly because of the BUG correction on NILFS2 Garbage
> Collector as my systems are using NILFS2 as rootfs and at the moment they
> are unable to boot off a nilfs2-formatted disk.
> 
> Have a look at: 
> https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/nilfs2?h=v4.19.129=1b6f42200b8313d3895c26f6553bbc8380bf1c35
> 
> 
> At the moment the only workaround I have found is using an ext4-formatted
> disk, but it is merely temporary.

The next point release for buster (10.5) will contain an update of
src:linux to 4.19.132, see
https://lists.debian.org/debian-stable-announce/2020/07/msg1.html
.

Regards,
Salvatore



Next Kernel update for Buster

2020-07-28 Thread gianluca

Hello,
I was wondering if there is any chance to have a better kernel from the 
4.19.129 or greater.


I am asking this, mainly because of the BUG correction on NILFS2 Garbage 
Collector as my systems are using NILFS2 as rootfs and at the moment 
they are unable to boot off a nilfs2-formatted disk.


Have a look at: 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/nilfs2?h=v4.19.129=1b6f42200b8313d3895c26f6553bbc8380bf1c35



At the moment the only workaround I have found is using an 
ext4-formatted disk, but it is merely temporary.


Best regards,
Gianluca Renzi
--
Eurek s.r.l.  |
Electronic Engineering| http://www.eurek.it
via Celletta 8/B, 40026 Imola, Italy  | Phone: +39-(0)542-609120
p.iva 00690621206 - c.f. 04020030377  | Fax:   +39-(0)542-609212



Bug#966420: linux-image-4.19.0-9-amd64: Freezing when NMI watchdog detect hard LOCKUP

2020-07-28 Thread newton
Package: src:linux
Version: 4.19.118-2+deb10u1
Severity: important

Dear Maintainer,

-- Package-specific info:
** Version:
Linux version 4.19.0-9-amd64 (debian-kernel@lists.debian.org) (gcc version 
8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.118-2+deb10u1 (2020-06-07)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-4.19.0-9-amd64 
root=UUID=72305f04-c6f2-4c34-9ed6-5b5a5080832c ro quiet

** Tainted: OE (12288)
 * Out-of-tree module has been loaded.
 * Unsigned module has been loaded.

** Kernel log:
[ 2877.834099] RAX:  RBX: 029a8b67a18b RCX: 941fa7a9cd40
[ 2877.834101] RDX:  RSI: 029a8b67a18b RDI: 941fa7a95f40
[ 2877.834102] RBP:  R08: 029a8b67a18b R09: 029a8b2a988b
[ 2877.834104] R10: 003d0900 R11: 029a8b2a988b R12: 0015be81
[ 2877.834105] R13: 9e421080 R14: 029a8b67a18b R15: 941fa7a9cdf8
[ 2877.834107] FS:  7f22241d2b10() GS:941fa7a8() 
knlGS:
[ 2877.834108] CS:  0010 DS:  ES:  CR0: 80050033
[ 2877.834110] CR2: 7fa69cf0cff0 CR3: 0001f96f4000 CR4: 06e0
[ 2877.834110] Call Trace:
[ 2877.834111]  
[ 2877.834112]  clockevents_program_event+0x54/0xf0
[ 2877.834114]  hrtimer_interrupt+0x12e/0x220
[ 2877.834115]  smp_apic_timer_interrupt+0x6a/0x140
[ 2877.834116]  apic_timer_interrupt+0xf/0x20
[ 2877.834117]  
[ 2877.834118] RIP: 0033:0x7f22b8786843
[ 2877.834121] Code: 00 44 0f b6 84 24 a6 02 00 00 44 0f b6 9c 24 a7 02 00 00 
44 0f b6 94 24 ab 02 00 00 44 0f b6 8c 24 af 02 00 00 42 33 74 85 00 <42> 8b 0c 
93 42 33 14 9b 44 0f b6 84 24 a3 02 00 00 89 54 24 40 31
[ 2877.834122] RSP: 002b:7f22241d25d0 EFLAGS: 0282 ORIG_RAX: 
ff13
[ 2877.834125] RAX: 6f7fc827 RBX: 7f22b88d87c0 RCX: 
[ 2877.834126] RDX: 84b8794e RSI: ef9782b9 RDI: 78e074d5
[ 2877.834128] RBP: 7f22b88d8bc0 R08: 0036 R09: 005b
[ 2877.834129] R10: 000d R11: 0032 R12: 7f22b88d8fc0
[ 2877.834130] R13: 7f22b88d93c0 R14: 7f22b88da3c0 R15: 7f22b88d9fc0
[ 2877.834186] NMI watchdog: Watchdog detected hard LOCKUP on cpu 1
[ 2877.834189] Modules linked in: tun rfkill vboxnetadp(OE) vboxnetflt(OE) 
vboxdrv(OE) binfmt_misc snd_usb_audio uvcvideo videobuf2_vmalloc 
videobuf2_memops videobuf2_v4l2 videobuf2_common videodev snd_usbmidi_lib media 
snd_rawmidi snd_seq_device snd_hda_codec_realtek snd_hda_codec_hdmi 
snd_hda_codec_generic snd_hda_intel snd_hda_codec snd_hda_core edac_mce_amd 
kvm_amd ccp snd_hwdep serio_raw snd_pcm rng_core snd_timer kvm snd sg 
sp5100_tco pcspkr irqbypass soundcore wmi_bmof evdev k10temp pcc_cpufreq 
acpi_cpufreq squashfs zstd_decompress xxhash loop cuse fuse ib_iser rdma_cm 
iw_cm ib_cm ib_core configfs iscsi_tcp libiscsi_tcp sunrpc libiscsi 
scsi_transport_iscsi ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 
crc32c_generic fscrypto ecb crypto_simd cryptd glue_helper aes_x86_64 
hid_generic usbhid
[ 2877.834233]  hid amdgpu chash gpu_sched mfd_core sr_mod cdrom sd_mod radeon 
ohci_pci i2c_algo_bit ata_generic ttm pata_atiixp ohci_hcd ahci ehci_pci 
drm_kms_helper libahci libata r8169 ehci_hcd firewire_ohci drm realtek libphy 
usbcore scsi_mod i2c_piix4 firewire_core crc_itu_t usb_common wmi button
[ 2877.834254] CPU: 1 PID: 1726 Comm: kswapd0 Tainted: G   OE 
4.19.0-9-amd64 #1 Debian 4.19.118-2+deb10u1
[ 2877.834257] Hardware name: Gigabyte Technology Co., Ltd. 
GA-880GM-UD2H/GA-880GM-UD2H, BIOS F8 10/11/2010
[ 2877.834258] RIP: 0010:ktime_get+0x7d/0xa0
[ 2877.834261] Code: 51 01 48 21 d0 48 d1 ea 48 f7 d2 48 85 c2 8b 15 f9 bd 51 
01 48 0f 45 c5 45 3b 65 00 74 0e 45 8b 65 00 41 f6 c4 01 74 a9 f3 90  f2 48 
0f af c2 48 01 f0 48 d3 e8 48 01 d8 5b 5d 41 5c 41 5d c3
[ 2877.834263] RSP: :941fa7a43f38 EFLAGS: 0002
[ 2877.834265] RAX:  RBX: 029a8b67a18b RCX: 941fa7a5cd00
[ 2877.834267] RDX:  RSI: 029a8b67a18b RDI: 941fa7a55f40
[ 2877.834268] RBP:  R08: 029a8b67a18b R09: 029a8b2a988b
[ 2877.834270] R10: 003d0900 R11: 029a8b2a988b R12: 0015be81
[ 2877.834271] R13: 9e421080 R14: 029a8b67a18b R15: 941fa7a5cdf8
[ 2877.834273] FS:  7f222440ab10() GS:941fa7a4() 
knlGS:
[ 2877.834274] CS:  0010 DS:  ES:  CR0: 80050033
[ 2877.834275] CR2: 7fff50347fd8 CR3: 0001f96f4000 CR4: 06e0
[ 2877.834276] Call Trace:
[ 2877.834277]  
[ 2877.834278]  clockevents_program_event+0x54/0xf0
[ 2877.834280]  hrtimer_interrupt+0x12e/0x220
[ 2877.834281]  smp_apic_timer_interrupt+0x6a/0x140
[ 2877.834282]  apic_timer_interrupt+0xf/0x20
[ 2877.834282]  
[ 2877.834283] RIP: 0033:0x7f22241d4ee4
[ 2877.834287] Code: f3 0f e6 51 10 f3 0f e6 59 18 f3 0f e6 61 20 f3 0f e6 69 
28 f3 0f e6 71 30 f3 0f e6 79 38 41 0f 54 e5 41 0f 54 ed 41 0f 54 f5 <41> 0f 54 
fd 41