[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-27 Thread Frederik Kriewitz
No crashes so far with 3.13.0-38-generic, looks like it's fixed.

** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-22 Thread Frederik Kriewitz
We installed 3.13.0-38-generic from proposed during a maintenance today on one 
of the initially affected server.
We'll provide an update soon.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Fix Released
Status in “linux” source package in Trusty:
  Fix Committed
Status in “linux” source package in Utopic:
  Fix Released

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-07 Thread Frederik Kriewitz
Can't test with the 3.13 mainline as these are productive servers and we can't 
risk another outage at this time.
As mentioned in the first post it in appears to be fixed in the 3.16 mainline 
kernel.


** Tags added: kernel-unable-to-test-upstream

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  

[Kernel-packages] [Bug 1377851] Re: Kernel panic skb_segment+0x5d7/0x980

2014-10-06 Thread Frederik Kriewitz
backtrace already posted

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851

Title:
  Kernel panic skb_segment+0x5d7/0x980

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  On two Ubuntu 14.04 amd64 servers with tg3 NICs acting as a openvpn gateway 
we recently had a lot of trouble with kernel panics 
(linux-image-3.13.0-36-generic 3.13.0-36.63)
  The panics were kind of random happening sometimes already during the boot 
process and sometimes a couple of hours later.
  The boxes were running perfectly find for a couple of months before. We 
believe some kind of special packet triggered the bug.

  Potential related bugs:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1331219
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313591

  Upgrading to linux-image-3.16.3-031603-generic
  (3.16.3-031603.201409171435) solved the problem for us.

  [ 6076.726520] BUG: unable to handle kernel NULL pointer dereference at 
006c
  [ 6076.737716] IP: [81616787] skb_segment+0x5d7/0x980
  [ 6076.745780] PGD 0 
  [ 6076.748641] Oops:  [#1] SMP 
  [ 6076.753268] Modules linked in: btrfs ufs qnx4 hfsplus hfs minix ntfs msdos 
jfs xfs libcrc32c cdc_ether usbnet mii mpt3sas mpt2sas raid_class 
scsi_transport_sas mptctl mptbase ipmi_si ipmi_devintf dell_rbu gpio_ich 
intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp dcdbas kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd 8021q garp stp mrp llc sb_edac 
edac_core shpchp joydev pl2303 usbserial lpc_ich wmi mei_me mei mac_hid 
acpi_power_meter ioatdma nf_conntrack dca lp parport raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
tg3 ahci hid_generic raid0 ptp usbhid multipath hid libahci pps_core linear 
[last unloaded: ipmi_si]
  [ 6076.850743] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 3.13.0-36-generic 
#63-Ubuntu
  [ 6076.861485] Hardware name: Dell Inc. PowerEdge R620/0PXXHP, BIOS 1.6.0 
03/07/2013
  [ 6076.872104] task: 880223841800 ti: 880223848000 task.ti: 
880223848000
  [ 6076.882722] RIP: 0010:[81616787]  [81616787] 
skb_segment+0x5d7/0x980
  [ 6076.894243] RSP: 0018:880227263790  EFLAGS: 00010246
  [ 6076.901769] RAX: 0646 RBX: 88021f03f000 RCX: 
8801ed4fff00
  [ 6076.911893] RDX: 0646 RSI: 00c2 RDI: 
ea0007f6de00
  [ 6076.971665] RBP: 880227263858 R08: fff6 R09: 
0001
  [ 6077.031463] R10: 88021f03e800 R11: 00010552 R12: 
8801fdb1fc80
  [ 6077.091313] R13: 0001 R14:  R15: 
0646
  [ 6077.151619] FS:  () GS:88022726() 
knlGS:
  [ 6077.262424] CS:  0010 DS:  ES:  CR0: 80050033
  [ 6077.320083] CR2: 006c CR3: 01c0e000 CR4: 
000407e0
  [ 6077.379854] Stack:
  [ 6077.433555]  811a48f9 8802272772c0 fff6 
000a
  [ 6077.546280]  00010552 006a 88021f03e800 
00010020
  [ 6077.658915]  ffe4 00010012 001c055c 
88021f03f000
  [ 6077.771400] Call Trace:
  [ 6077.824494]  IRQ 
  [ 6077.827251]  [811a48f9] ? __kmalloc_node_track_caller+0xb9/0x290
  [ 6077.933211]  [8168149d] tcp_gso_segment+0x10d/0x3f0
  [ 6077.988641]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.043154]  [810a5db2] ? enqueue_task_fair+0x422/0x6c0
  [ 6078.097358]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.150464]  [816a0fb4] gre_gso_segment+0x134/0x370
  [ 6078.202321]  [8109828d] ? ttwu_do_activate.constprop.74+0x5d/0x70
  [ 6078.255348]  [81691822] inet_gso_segment+0x132/0x360
  [ 6078.306129]  [8109a800] ? try_to_wake_up+0x240/0x2c0
  [ 6078.355712]  [81623ffc] skb_mac_gso_segment+0x9c/0x180
  [ 6078.404660]  [8162413d] __skb_gso_segment+0x5d/0xb0
  [ 6078.452918]  [8162444a] dev_hard_start_xmit+0x18a/0x560
  [ 6078.501057]  [8164360e] sch_direct_xmit+0xee/0x1c0
  [ 6078.548821]  [81624a50] __dev_queue_xmit+0x230/0x500
  [ 6078.596793]  [81624d30] dev_queue_xmit+0x10/0x20
  [ 6078.644041]  [8162be31] neigh_direct_output+0x11/0x20
  [ 6078.691822]  [8165d370] ip_finish_output+0x1b0/0x3b0
  [ 6078.739211]  [8165e8d8] ip_output+0x58/0x90
  [ 6078.784448]  [8165a84b] ip_forward_finish+0x8b/0x170
  [ 6078.830211]  [8165ac85] ip_forward+0x355/0x410
  [ 6078.874484]  [8165899d] ip_rcv_finish+0x7d/0x350
  [ 6078.918046]  [816592e8] ip_rcv+0x298/0x3d0
  [ 6078.959829]  [81622bb6]