This bug was fixed in the package linux-gcp - 6.16.0-1001.1

---------------
linux-gcp (6.16.0-1001.1) questing; urgency=medium

  * questing/linux-gcp: 6.16.0-1001.1 -proposed tracker (LP: #2120661)

  * Packaging resync (LP: #1786013)
    - [Packaging] update update.conf
    - [Packaging] debian.gcp/dkms-versions -- update from kernel-versions
      (main/d2025.08.14)

  * Attestation failure due to vTPM device error (LP: #2116545)
    - SAUCE: Revert "x86/mtrr: Rename mtrr_overwrite_state() to
      guest_force_mtrr_state()"
    - SAUCE: Revert "x86/kvm: Override default caching mode for SEV-SNP and
      TDX"

  * linux-gcp: move ptp_kvm to linux-modules in GCP kernels (LP: #2110241)
    - [Packaging] gcp: Move ptp_kvm module to linux-modules

  * Miscellaneous Ubuntu changes
    - [Packaging] move to questing v6.16
    - [Config] updateconfigs following Ubuntu-6.16.0-14.14 rebase
    - [Packaging] remove do_extras_package

  [ Ubuntu: 6.16.0-16.16 ]

  * questing/linux: 6.16.0-16.16 -proposed tracker (LP: #2120720)

  [ Ubuntu: 6.16.0-14.14 ]

  * questing/linux: 6.16.0-14.14 -proposed tracker (LP: #2120657)
  * BPF header file in wrong location (LP: #2118965)
    - [Packaging] Install bpf header to correct location
  * enlarge the number of the serial port for sh-sci serial driver
    (LP: #2116140)
    - [Config] enlarge CONFIG_SERIAL_SH_SCI_NR_UARTS
  * Ubuntu 24.04+ arm64: screen resolution fixed to 1024x768 with last kernel
    update (LP: #2115068)
    - [Config] Replace FB_HYPERV with DRM_HYPERV
  * Miscellaneous Ubuntu changes
    - [Packaging] move to unversioned gcc by default
    - [Config] bump toolchain version to gcc-15

  [ Ubuntu: 6.16.0-13.13 ]

  * questing/linux: 6.16.0-13.13 -proposed tracker (LP: #2119951)
  * Miscellaneous Ubuntu changes
    - [Packaging] debian.master/dkms-versions -- remove ipu6 since it's
      upstream

  [ Ubuntu: 6.16.0-12.12 ]

  * questing/linux: 6.16.0-12.12 -proposed tracker (LP: #2119711)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/d2025.07.28)
    - [Packaging] resync git-ubuntu-log
    - [Packaging] update variants
    - [Packaging] update annotations scripts

  [ Ubuntu: 6.16.0-11.11 ]

  * questing/linux: 6.16.0-11.11 -proposed tracker (LP: #2119360)
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor5.0.0 [1/93]: Stacking: Audit: Create audit_stamp
      structure
    - SAUCE: apparmor5.0.0 [2/93]: Stacking: Audit: Allow multiple records in
      an audit_buffer
    - SAUCE: apparmor5.0.0 [3/93]: Stacking: LSM: security_lsmblob_to_secctx
      module selection
    - SAUCE: apparmor5.0.0 [4/93]: Stacking: Audit: Add record for multiple
      task security contexts
    - SAUCE: apparmor5.0.0 [5/93]: Stacking: Audit: multiple subject lsm
      values for netlabel
    - SAUCE: apparmor5.0.0 [6/93]: Stacking: Audit: Add record for multiple
      object contexts
    - SAUCE: apparmor5.0.0 [7/93]: Stacking: LSM: Single calls in secid hooks
    - SAUCE: apparmor5.0.0 [8/93]: Stacking: LSM: Exclusive secmark usage
    - SAUCE: apparmor5.0.0 [9/93]: Stacking: Audit: Call only the first of the
      audit rule hooks
    - SAUCE: apparmor5.0.0 [10/93]: Stacking: AppArmor: Remove the exclusive
      flag
    - SAUCE: apparmor5.0.0 [11/93]: 6.17 apparmor-next: apparmor: Use
      str_yes_no() helper function
    - SAUCE: apparmor5.0.0 [12/93]: 6.17 apparmor-next: apparmor: Improve
      debug print infrastructure
    - SAUCE: apparmor5.0.0 [13/93]: 6.17 apparmor-next: apparmor: cleanup:
      attachment perm lookup to use lookup_perms()
    - SAUCE: apparmor5.0.0 [14/93]: 6.17 apparmor-next: apparmor: remove
      redundant unconfined check.
    - SAUCE: apparmor5.0.0 [15/93]: 6.17 apparmor-next: apparmor: switch
      signal mediation to use RULE_MEDIATES
    - SAUCE: apparmor5.0.0 [16/93]: 6.17 apparmor-next: apparmor: ensure
      labels with more than one entry have correct flags
    - SAUCE: apparmor5.0.0 [17/93]: 6.17 apparmor-next: apparmor: remove
      explicit restriction that unconfined cannot use change_hat
    - SAUCE: apparmor5.0.0 [18/93]: 6.17 apparmor-next: apparmor: cleanup:
      refactor file_perm() to doc semantics of some checks
    - SAUCE: apparmor5.0.0 [19/93]: 6.17 apparmor-next: apparmor: carry
      mediation check on label
    - SAUCE: apparmor5.0.0 [20/93]: 6.17 apparmor-next: apparmor: add
      additional flags to extended permission.
    - SAUCE: apparmor5.0.0 [21/93]: 6.17 apparmor-next: apparmor: add support
      for profiles to define the kill signal
    - SAUCE: apparmor5.0.0 [22/93]: 6.17 apparmor-next: apparmor: fix
      x_table_lookup when stacking is not the first entry
    - SAUCE: apparmor5.0.0 [23/93]: 6.17 apparmor-next: apparmor: add ability
      to mediate caps with policy state machine
    - SAUCE: apparmor5.0.0 [24/93]: 6.17 apparmor-next: apparmor: remove
      af_select macro
    - SAUCE: apparmor5.0.0 [25/93]: 6.17 apparmor-next: apparmor: lift kernel
      socket check out of critical section
    - SAUCE: apparmor5.0.0 [26/93]: 6.17 apparmor-next: apparmor: in
      preparation for finer networking rules rework match_prot
    - SAUCE: apparmor5.0.0 [27/93]: 6.17 apparmor-next: apparmor: add fine
      grained af_unix mediation
    - SAUCE: apparmor5.0.0 [28/93]: 6.17 apparmor-next: apparmor: gate make
      fine grained unix mediation behind v9 abi
    - SAUCE: apparmor5.0.0 [29/93]: 6.17 apparmor-next: apparmor: fix dbus
      permission queries to v9 ABI
    - SAUCE: apparmor5.0.0 [30/93]: 6.17 apparmor-next: apparmor: Fix checking
      address of an array in accum_label_info()
    - SAUCE: apparmor5.0.0 [31/93]: 6.17 apparmor-next: apparmor: Modify
      mismatched function name
    - SAUCE: apparmor5.0.0 [32/93]: 6.17 apparmor-next: apparmor: Modify
      mismatched function name
    - SAUCE: apparmor5.0.0 [33/93]: 6.17 apparmor-next: apparmor: fix typos
      and spelling errors
    - SAUCE: apparmor5.0.0 [34/93]: 6.17 apparmor-next: apparmor: use the
      condition in AA_BUG_FMT even with debug disabled
    - SAUCE: apparmor5.0.0 [35/93]: 6.17 apparmor-next: apparmor: Remove
      unused variable 'sock' in __file_sock_perm()
    - SAUCE: apparmor5.0.0 [68/93]: Revert "6.17 apparmor-next: apparmor: fix
      dbus permission queries to v9 ABI"
    - SAUCE: apparmor5.0.0 [69/93]: Revert "6.17 apparmor-next: apparmor: gate
      make fine grained unix mediation behind v9 abi"
    - SAUCE: apparmor5.0.0 [70/93]: apparmor: net: patch to provide
      compatibility with v2.x net rules
    - SAUCE: apparmor5.0.0 [71/93]: apparmor: net: add fine grained ipv4/ipv6
      mediation
    - SAUCE: apparmor5.0.0 [72/93]: apparmor: userns: add unprivileged user ns
      mediation
    - SAUCE: apparmor5.0.0 [73/93]: apparmor: userns: Add sysctls for
      additional controls of unpriv userns restrictions
    - SAUCE: apparmor5.0.0 [75/93]: apparmor: userns: open userns related
      sysctl so lxc can check if restriction are in place
    - SAUCE: apparmor5.0.0 [76/93]: apparmor: userns: allow profile to be
      transitioned when a userns is created
    - SAUCE: apparmor5.0.0 [80/93]: apparmor: uring: add io_uring mediation
    - SAUCE: apparmor5.0.0 [83/93]: apparmor: prompt: setup slab cache for
      audit data
    - SAUCE: apparmor5.0.0 [84/93]: apparmor: prompt: add the ability for
      profiles to have a learning cache
    - SAUCE: apparmor5.0.0 [85/93]: apparmor: prompt: enable userspace upcall
      for mediation
    - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS
  * Installation of AppArmor on a 6.14 kernel produces error message "Illegal
    number: yes" (LP: #2102680)
    - SAUCE: apparmor5.0.0 [81/93]: apparmor: create an
      AA_SFS_TYPE_BOOLEAN_INTPRINT sysctl variant
    - SAUCE: apparmor5.0.0 [82/93]: apparmor: Use AA_SFS_FILE_BOOLEAN_INTPRINT
      for userns and io_uring sysctls
  * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe]
    apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in
    mantic (LP: #2032602)
    - SAUCE: apparmor5.0.0 [74/93]: apparmor: userns - make it so special
      unconfined profiles can mediate user namespaces
  * Miscellaneous Ubuntu changes
    - SAUCE: apparmor5.0.0 [36/93]: 6.17 apparmor-next: security/apparmor: use
      kfree_sensitive() in unpack_secmark()
    - SAUCE: apparmor5.0.0 [37/93]: 6.17 apparmor-next: apparmor: Fix
      incorrect profile->signal range check
    - SAUCE: apparmor5.0.0 [38/93]: 6.17 apparmor-next: apparmor: fix some
      kernel-doc issues in header files
    - SAUCE: apparmor5.0.0 [39/93]: 6.17 apparmor-next: apparmor: ensure
      WB_HISTORY_SIZE value is a power of 2
    - SAUCE: apparmor5.0.0 [40/93]: 6.17 apparmor-next: apparmor: fix loop
      detection used in conflicting attachment resolution
    - SAUCE: apparmor5.0.0 [41/93]: 6.17 apparmor-next: apparmor: make all
      generated string array headers const char *const
    - SAUCE: apparmor5.0.0 [42/93]: 6.17 apparmor-next: apparmor: force audit
      on unconfined exec if info is set by find_attach
    - SAUCE: apparmor5.0.0 [43/93]: 6.17 apparmor-next: apparmor: move the
      "conflicting profile attachments" infostr to a const declaration
    - SAUCE: apparmor5.0.0 [44/93]: 6.17 apparmor-next: apparmor: include
      conflicting attachment info for confined ix/ux fallback
    - SAUCE: apparmor5.0.0 [45/93]: 6.17 apparmor-next: apparmor: force
      auditing of conflicting attachment execs from confined
    - SAUCE: apparmor5.0.0 [46/93]: 6.17 apparmor-next: apparmor: make
      debug_values_table static
    - SAUCE: apparmor5.0.0 [47/93]: 6.17 apparmor-next: apparmor: Document
      that label must be last member in struct aa_profile
    - SAUCE: apparmor5.0.0 [48/93]: 6.17 apparmor-next: apparmor: mitigate
      parser generating large xtables
    - SAUCE: apparmor5.0.0 [49/93]: 6.17 apparmor-next: apparmor: make
      __begin_current_label_crit_section() indicate whether put is needed
    - SAUCE: apparmor5.0.0 [50/93]: 6.17 apparmor-next: apparmor: update
      kernel doc comments for xxx_label_crit_section
    - SAUCE: apparmor5.0.0 [51/93]: 6.17 apparmor-next: apparmor: Remove use
      of the double lock
    - SAUCE: apparmor5.0.0 [52/93]: 6.17 apparmor-next: apparmor: fix af_unix
      auditing to include all address information
    - SAUCE: apparmor5.0.0 [53/93]: 6.17 apparmor-next: apparmor: fix
      AA_DEBUG_LABEL()
    - SAUCE: apparmor5.0.0 [54/93]: 6.17 apparmor-next: apparmor: fix
      regression in fs based unix sockets when using old abi
    - SAUCE: apparmor5.0.0 [55/93]: 6.17 apparmor-next: apparmor: make sure
      unix socket labeling is correctly updated.
    - SAUCE: apparmor5.0.0 [56/93]: 6.17 apparmor-next: apparmor: shift ouid
      when mediating hard links in userns
    - SAUCE: apparmor5.0.0 [57/93]: 6.17 apparmor-next: apparmor: shift uid
      when mediating af_unix in userns
    - SAUCE: apparmor5.0.0 [58/93]: 6.17 apparmor-next: apparmor: Fix 8-byte
      alignment for initial dfa blob streams
    - SAUCE: apparmor5.0.0 [59/93]: 6.17 apparmor-next: apparmor: Fix
      unaligned memory accesses in KUnit test
    - SAUCE: apparmor5.0.0 [60/93]: 6.17 apparmor-next: apparmor: fix kernel
      doc warnings for kernel test robot
    - SAUCE: apparmor5.0.0 [61/93]: 6.17 apparmor-next: apparmor: remove
      redundant perms.allow MAY_EXEC bitflag set
    - SAUCE: apparmor5.0.0 [62/93]: 6.17 apparmor-next: apparmor: fix
      documentation mismatches in val_mask_to_str and socket functions
    - SAUCE: apparmor5.0.0 [63/93]: 6.17 apparmor-next: apparmor: transition
      from a list of rules to a vector of rules
    - SAUCE: apparmor5.0.0 [64/93]: 6.17 apparmor-next: apparmor: fix: accept2
      being specifie even when permission table is presnt
    - SAUCE: apparmor5.0.0 [65/93]: 6.17 apparmor-next: apparmor: Remove the
      unused variable rules
    - SAUCE: apparmor5.0.0 [66/93]: 6.17 apparmor-next: apparmor: fix test
      error: WARNING in apparmor_unix_stream_connect
    - SAUCE: apparmor5.0.0 [67/93]: 6.17 apparmor-next: apparmor: fix
      Regression on linux-next (next-20250721)
    - SAUCE: apparmor5.0.0 [77/93]: aoparmor: userns: Add support for execpath
      in userns
    - SAUCE: apparmor5.0.0 [78/93]: apparmor: mqueue: call
      security_inode_init_security on inode creation
    - SAUCE: apparmor5.0.0 [79/93]: apparmor: mqueue: add fine grained
      mediation of posix mqueues
    - SAUCE: apparmor5.0.0 [86/93]: apparmor: prompt: pass prompt boolean
      through into path_name as well
    - SAUCE: apparmor5.0.0 [87/93]: apparmor: add AA_DEBUG_PROFILE to have
      debug on profiles with flag set
    - SAUCE: apparmor5.0.0 [88/93]: apparmor: make str table more generic and
      be able to have multiple entries
    - SAUCE: apparmor5.0.0 [89/93]: apparmor: check for supported version in
      notification messages.
    - SAUCE: apparmor5.0.0 [90/93]: apparmor: refactor building notice so it
      is easier to extend
    - SAUCE: apparmor5.0.0 [91/93]: apparmor: switch from ENOTSUPP to
      EPROTONOSUPPORT
    - SAUCE: apparmor5.0.0 [92/93]: UBUNTU: SAUCE: apparmor5.0.0 [92/93]:
      apparmor: add support for meta data tags
    - SAUCE: apparmor5.0.0 [93/93]: apparmor: mmap_file() doesn't need to be
      called atomically

  [ Ubuntu: 6.16.0-10.10 ]

  * questing/linux: 6.16.0-10.10 -proposed tracker (LP: #2118882)
  * Miscellaneous Ubuntu changes
    - Update dropped.txt
  * Miscellaneous upstream changes
    - Revert "UBUNTU: [Packaging] disable signing for s390x"

  [ Ubuntu: 6.16.0-9.9 ]

  * questing/linux: 6.16.0-9.9 -proposed tracker (LP: #2117331)

  [ Ubuntu: 6.16.0-8.8 ]

  * questing/linux: 6.16.0-8.8 -proposed tracker (LP: #2117156)
  * Miscellaneous Ubuntu changes
    - [Packaging] rename to linux
    - [Packaging] disable signing for s390x

  [ Ubuntu-unstable: 6.16.0-7.7 ]

  * questing/linux-unstable: 6.16.0-7.7 -proposed tracker (LP: #2116881)
  * Miscellaneous Ubuntu changes
    - [Config] updateconfigs following v6.16-rc6 rebase

  [ Ubuntu-unstable: 6.16.0-6.6 ]

  * questing/linux-unstable: 6.16.0-6.6 -proposed tracker (LP: #2116265)
  * [UBUNTU 25.04] lszcrypt output shows no cards because ap module has to be
    loaded manually (LP: #2116061)
    - [Config] s390: Build ap driver into the kernel
  * Miscellaneous Ubuntu changes
    - [Packaging] debian.master/control.stub.in: fix dpkg-checkbuilddeps
    - [Config] RUSTC_VERSION = 108501

  [ Ubuntu-unstable: 6.16.0-5.5 ]

  * questing/linux-unstable: 6.16.0-5.5 -proposed tracker (LP: #2115966)
  * Miscellaneous Ubuntu changes
    - [Packaging] debian.master/control.stub.in: prepare for cross-compiling
    - [Packaging] debian/rules.d/0-common-vars.mk: avoid infinite loop
    - [Packaging] debian/rules.d/0-common-vars.mk: use native GCC
    - [Packaging] debian/rules.d/0-common-vars.mk: enable linux-tools cross-
      compilation
    - [Packaging] debian/rules.d/0-common-vars.mk: fix linux-tools cross-build
    - [Config] updateconfigs following v6.16-rc5 rebase

  [ Ubuntu-unstable: 6.16.0-4.4 ]

  * questing/linux-unstable: 6.16.0-4.4 -proposed tracker (LP: #2115628)

  [ Ubuntu-unstable: 6.16.0-3.3 ]

  * questing/linux-unstable: 6.16.0-3.3 -proposed tracker (LP: #2115254)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/d2025.06.03)
  * arm64: kernel image cannot be booted in UEFI despite EFI stub and ZBOOT
    (LP: #2098111)
    - [Packaging] Install compressed vmlinuz.efi on arm64
  * Creating a VXLAN interface with a Fan mapping causes a NULL pointer
    dereference caught by ubuntu_fan_smoke_test:sut-scan (LP: #2113992)
    - SAUCE: fan: vxlan: parse fan-map from IFLA_VXLAN_FAN_MAP attribute ID
  * Dell AIO backlight is not working, dell_uart_backlight module is missing
    (LP: #2083800)
    - [Config] enable CONFIG_DELL_UART_BACKLIGHT
  * Miscellaneous Ubuntu changes
    - [Packaging] Update debian/signature-inclusion

  [ Ubuntu-unstable: 6.16.0-2.2 ]

  * questing/linux-unstable: 6.16.0-2.2 -proposed tracker (LP: #2114841)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/d2025.06.03)
  * Miscellaneous Ubuntu changes
    - [Config] updateconfigs following v6.16-rc2

  [ Ubuntu-unstable: 6.16.0-1.1 ]

  * questing/linux-unstable: 6.16.0-1.1 -proposed tracker (LP: #2114165)
  * Support Sony IMX471 camera sensor for Intel IPU7 platforms (LP: #2107320)
    - SAUCE: media: ipu-bridge: Support imx471 sensor
  * Rotate the Canonical Livepatch key (LP: #2111244)
    - [config] prepare for Canonical Livepatch key rotation
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/d2025.05.26)
  * Miscellaneous Ubuntu changes
    - Update dropped.txt
    - Update dropped.txt wrt v6.16-rc1 rebase
    - [Config] updateconfigs following v6.16-rc1
    - [Config] FTBFS: disable INTEL_SKL_INT3472
    - SAUCE: binder: turn into module - lock_vma_under_rcu()
    - [Packaging] debian.master/dkms-versions -- temporarily remove zfs FTBFS
    - [Packaging] debian.master/dkms-versions -- temporarily remove
      v4l2loopback FTBFS

  [ Ubuntu-unstable: 6.15.0-2.2 ]

  * questing/linux-unstable: 6.15.0-2.2 -proposed tracker (LP: #2111721)
  * Miscellaneous Ubuntu changes
    - [Config] Updateconfigs for v6.15-rc7 rebase

  [ Ubuntu-unstable: 6.15.0-1.1 ]

  * questing/linux-unstable: 6.15.0-1.1 -proposed tracker (LP: #2110148)
  * Drop support for modules-extra (LP: #2042831)
    - [Packaging] Drop support for modules-extra
  * Miscellaneous Ubuntu changes
    - [Packaging] Rename to linux-unstable, bump version
    - [Packaging] Re-enable tools build on cross-builds
    - [Packaging] debian.master/dkms-versions -- temporarily remove all dkms
    - [Packaging] Introduce do_sources_list build flag
    - [Config] Updateconfigs for v6.15-rc5 rebase
    - SAUCE: Revert "gcc-15: acpi: sprinkle random '__nonstring' crumbles 
around"

  [ Ubuntu-unstable: 6.15.0-0.0 ]

  * Dummy entry

 -- Paolo Pisati <[email protected]>  Tue, 19 Aug 2025 12:10:29
+0200

** Changed in: linux-gcp (Ubuntu)
       Status: Invalid => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2113992

Title:
  Creating a VXLAN interface with a Fan mapping causes a NULL pointer
  dereference caught by ubuntu_fan_smoke_test:sut-scan

Status in linux package in Ubuntu:
  Fix Released
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-hwe-6.14 package in Ubuntu:
  New
Status in linux source package in Noble:
  Invalid
Status in linux-gcp source package in Noble:
  Invalid
Status in linux-hwe-6.14 source package in Noble:
  Fix Released
Status in linux source package in Plucky:
  Fix Released
Status in linux-gcp source package in Plucky:
  Fix Released
Status in linux-hwe-6.14 source package in Plucky:
  Invalid

Bug description:
  SRU cycle 2025.05.19 regression test results showed a kernel panic
  caused by test ubuntu_fan_smoke_test:sut-scan for plucky:linux-gcp
  6.14.0-1008.8 The failure was subsequently determined to affect the
  generic kernel as well. [ 1012.062312] BUG: kernel NULL pointer
  dereference, address: 0000000000000000 [ 1012.069603] #PF: supervisor
  read access in kernel mode [ 1012.074864] #PF: error_code(0x0000) -
  not-present page [ 1012.080097] PGD 0 P4D 0 [ 1012.082728] Oops: Oops:
  0000 [#1] SMP NOPTI [ 1012.087010] CPU: 2 UID: 0 PID: 4687 Comm: ip
  Not tainted 6.14.0-1008-gcp #8-Ubuntu [ 1012.094688] Hardware name:
  Google Google Compute Engine/Google Compute Engine, BIOS Google
  05/29/2025 [ 1012.104000] RIP: 0010:vxlan_nl2conf+0xa5/0xff0 [vxlan] [
  1012.109256] Code: 48 85 c0 0f 84 4c 06 00 00 8b 40 04 89 43 04 b8 02
  00 00 00 66 89 03 49 83 bc 24 10 01 00 00 00 74 6d 49 8b 84 24 08 01
  00 00 <0f> b7 38 8d 57 fc 0f b7 d2 83 fa 03 7e 57 49 81 c2 80 0a 00 00
  48 [ 1012.128119] RSP: 0018:ffffa1f802c63380 EFLAGS: 00010286 [
  1012.133439] RAX: 0000000000000000 RBX: ffffa1f802c63418 RCX:
  0000000000000000 [ 1012.140668] RDX: ffff95bcce0d2000 RSI:
  0000000000000000 RDI: ffffa1f802c63490 [ 1012.147898] RBP:
  ffffa1f802c63400 R08: 0000000000000000 R09: ffffa1f802c63760 [
  1012.155128] R10: ffff95bcce0d2000 R11: 0000000000000000 R12:
  ffff95bd2f144a48 [ 1012.162356] R13: ffffa1f802c63760 R14:
  00ffffff00000008 R15: 0000000000000000 [ 1012.169588] FS:
  00007eb23310c840(0000) GS:ffff95cbbf700000(0000)
  knlGS:0000000000000000 [ 1012.177777] CS: 0010 DS: 0000 ES: 0000 CR0:
  0000000080050033 [ 1012.183618] CR2: 0000000000000000 CR3:
  000000015b6a3002 CR4: 0000000000370ef0 [ 1012.190850] Call Trace: [
  1012.193393] <TASK> [ 1012.195589] ? alloc_netdev_mqs+0x3bc/0x560 [
  1012.199869] ? __kvmalloc_node_noprof+0x5f/0x100 [ 1012.204584]
  vxlan_newlink+0x58/0xb0 [vxlan] [ 1012.208971] ?
  vxlan_newlink+0x58/0xb0 [vxlan] [ 1012.213515]
  rtnl_newlink_create+0x118/0x2a0 [ 1012.217884]
  __rtnl_newlink+0xc4/0x3f0 [ 1012.221730] rtnl_newlink+0x4df/0x960 [
  1012.225513] rtnetlink_rcv_msg+0x22f/0x440 [ 1012.229705] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.234590] ?
  update_io_ticks+0x79/0x80 [ 1012.238620] ?
  __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1012.243334]
  netlink_rcv_skb+0x55/0x100 [ 1012.247270] rtnetlink_rcv+0x15/0x30 [
  1012.250940] netlink_unicast+0x229/0x350 [ 1012.254957]
  netlink_sendmsg+0x214/0x460 [ 1012.258974] ____sys_sendmsg+0x3b4/0x3f0
  [ 1012.262994] ___sys_sendmsg+0x9a/0xf0 [ 1012.266754]
  __sys_sendmsg+0x8d/0xf0 [ 1012.270426] __x64_sys_sendmsg+0x1d/0x30 [
  1012.274441] x64_sys_call+0x6f9/0x2310 [ 1012.278285]
  do_syscall_64+0x7e/0x170 [ 1012.282045] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.286929] ?
  filemap_map_pages+0x523/0x5d0 [ 1012.291293] ?
  __lruvec_stat_mod_folio+0x79/0xd0 [ 1012.296006] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.300891] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.305778] ?
  do_read_fault+0xee/0x1e0 [ 1012.309711] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.314596] ?
  do_fault+0x151/0x210 [ 1012.318180] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.323065] ?
  handle_pte_fault+0x97/0x1f0 [ 1012.327260] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.332406] ?
  __handle_mm_fault+0x3d2/0x7a0 [ 1012.336773] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.341657] ?
  rseq_get_rseq_cs+0x22/0x240 [ 1012.345853] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.350737] ?
  rseq_ip_fixup+0x8d/0x1a0 [ 1012.354683] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.359568] ?
  arch_exit_to_user_mode_prepare.isra.0+0xc8/0xd0 [ 1012.365495] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.370380] ?
  irqentry_exit_to_user_mode+0x2d/0x1d0 [ 1012.375441] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.380325] ?
  irqentry_exit+0x21/0x40 [ 1012.384171] ?
  srso_alias_return_thunk+0x5/0xfbef5 [ 1012.389055] ?
  exc_page_fault+0x96/0x1a0 [ 1012.393084]
  entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 1012.398230] RIP:
  0033:0x7eb23329f2a6 [ 1012.401906] Code: 00 00 48 8b 15 53 1b 17 00 64
  89 02 48 c7 c2 ff ff ff ff 48 8b 5d f8 c9 48 89 d0 c3 0f 1f 84 00 00
  00 00 00 48 8b 45 10 0f 05 <48> 63 d0 3d 00 f0 ff ff 77 10 48 8b 5d f8
  48 89 d0 c9 c3 0f 1f 80 [ 1012.421218] RSP: 002b:00007ffe067eedb0
  EFLAGS: 00000202 ORIG_RAX: 000000000000002e [ 1012.428886] RAX:
  ffffffffffffffda RBX: 00007eb23310c840 RCX: 00007eb23329f2a6 [
  1012.436223] RDX: 0000000000000000 RSI: 00007ffe067eee40 RDI:
  0000000000000003 [ 1012.443452] RBP: 00007ffe067eedc0 R08:
  0000000000000000 R09: 0000000000000000 [ 1012.450680] R10:
  0000000000000000 R11: 0000000000000202 R12: 0000000000000048 [
  1012.457908] R13: 00005c51e00c1040 R14: 000000000000002c R15:
  00007ffe067ef4c8 [ 1012.465141] </TASK> [ 1012.467419] Modules linked
  in: vxlan ip6_udp_tunnel udp_tunnel xt_conntrack nft_chain_nat
  xt_MASQUERADE nf_nat bridge xfrm_user xfrm_algo xt_addrtype nft_compat
  nf_tables overlay binfmt_misc 8021q garp mrp stp llc nls_iso8859_1
  input_leds sch_fq_codel nvme_fabrics efi_pstore dm_multipath
  vsock_loopback vmw_vsock_virtio_transport_common
  vmw_vsock_vmci_transport vsock vmw_vmci dmi_sysfs ip_tables x_tables
  autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov
  async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0
  linear polyval_clmulni polyval_generic ghash_clmulni_intel psmouse
  sha256_ssse3 sha1_ssse3 gve serio_raw virtio_rng aesni_intel
  crypto_simd cryptd [ 1012.527936] CR2: 0000000000000000 [ 1012.531362]
  ---[ end trace 0000000000000000 ]--- [ 1012.556588] RIP:
  0010:vxlan_nl2conf+0xa5/0xff0 [vxlan] [ 1012.561837] Code: 48 85 c0 0f
  84 4c 06 00 00 8b 40 04 89 43 04 b8 02 00 00 00 66 89 03 49 83 bc 24
  10 01 00 00 00 74 6d 49 8b 84 24 08 01 00 00 <0f> b7 38 8d 57 fc 0f b7
  d2 83 fa 03 7e 57 49 81 c2 80 0a 00 00 48 [ 1012.580702] RSP:
  0018:ffffa1f802c63380 EFLAGS: 00010286 [ 1012.586044] RAX:
  0000000000000000 RBX: ffffa1f802c63418 RCX: 0000000000000000 [
  1012.593273] RDX: ffff95bcce0d2000 RSI: 0000000000000000 RDI:
  ffffa1f802c63490 [ 1012.600501] RBP: ffffa1f802c63400 R08:
  0000000000000000 R09: ffffa1f802c63760 [ 1012.607728] R10:
  ffff95bcce0d2000 R11: 0000000000000000 R12: ffff95bd2f144a48 [
  1012.614960] R13: ffffa1f802c63760 R14: 00ffffff00000008 R15:
  0000000000000000 [ 1012.622190] FS: 00007eb23310c840(0000)
  GS:ffff95cbbf700000(0000) knlGS:0000000000000000 [ 1012.630374] CS:
  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1012.636213] CR2:
  0000000000000000 CR3: 000000015b6a3002 CR4: 0000000000370ef0 [
  1012.643445] Kernel panic - not syncing: Fatal exception [
  1012.649071] Kernel Offset: 0x1d000000 from 0xffffffff81000000
  (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [
  1012.686314] Rebooting in 10 seconds..

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2113992/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to