syzbot


BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu

Status: upstream: reported C repro on 2026/02/13 20:07
Subsystems: netfilter
[Documentation on labels]
Reported-by: syzbot+334190e097a98a1b81bb@syzkaller.appspotmail.com
Fix commit: 21ec92774d15 net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop
Patched on: [ci-qemu-gce-upstream-auto ci-qemu-upstream ci-qemu-upstream-386 ci-qemu2-arm32 ci-qemu2-arm64 ci-qemu2-arm64-compat ci-qemu2-arm64-mte ci-snapshot-upstream-root ci-upstream-bpf-kasan-gce ci-upstream-bpf-next-kasan-gce ci-upstream-gce-leak ci-upstream-kasan-badwrites-root ci-upstream-kasan-gce ci-upstream-kasan-gce-386 ci-upstream-kasan-gce-root ci-upstream-kasan-gce-selinux-root ci-upstream-kasan-gce-smack-root ci-upstream-kmsan-gce-386-root ci-upstream-kmsan-gce-root ci-upstream-linux-next-kasan-gce-root ci-upstream-net-kasan-gce ci-upstream-net-this-kasan-gce ci-upstream-rust-kasan-gce ci2-upstream-fs ci2-upstream-kcsan-gce], missing on: [ci-qemu-native-arm64-kvm ci-qemu2-riscv64 ci-upstream-gce-arm64 ci2-upstream-usb]
First crash: 208d, last: 4d17h
Discussions (9)
Title Replies (including bot) Last reply
Re: [PATCH net v4 1/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop 1 (1) 2026/03/04 15:21
Re: [PATCH net v4 1/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop 1 (1) 2026/03/04 13:54
[PATCH net v4 0/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop and add selftest 2 (2) 2026/03/04 11:38
[PATCH net v4 1/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop 1 (1) 2026/03/04 11:38
[PATCH net v3 0/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop and add selftest 3 (3) 2026/03/04 09:16
[PATCH net v2 0/2] net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop and add selftest 5 (5) 2026/03/02 13:38
[PATCH net v1] net: nexthop: fix panic when IPv4 route references IPv6 nexthop 7 (7) 2026/03/01 18:11
[syzbot] Monthly netfilter report (Feb 2026) 0 (1) 2026/02/26 12:58
[syzbot] [net?] BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu 0 (1) 2026/02/13 20:07
Similar bugs (13)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu origin:upstream 8 C error 126 7h10m 147d 0/3 upstream: reported C repro on 2025/10/13 20:16
upstream KMSAN: uninit-value in ip_route_output_key_hash_rcu (4) net 7 2 1862d 1881d 0/29 auto-closed as invalid on 2021/06/01 04:17
upstream KMSAN: kernel-infoleak in copyout (2) net 17 C 6723 1005d 2174d 22/29 fixed on 2023/06/08 14:41
upstream KMSAN: uninit-value in ip_route_output_key_hash_rcu (5) net 7 1 1560d 1560d 0/29 auto-closed as invalid on 2022/02/28 08:56
upstream general protection fault in ip_route_output_key_hash_rcu (2) net 2 2 647d 658d 0/29 closed as invalid on 2024/07/26 12:16
upstream general protection fault in ip_route_output_key_hash_rcu (3) net 7 4 376d 402d 28/29 fixed on 2025/06/10 16:19
upstream KMSAN: kernel-infoleak in _copy_to_iter (7) net 21 C 138977 1109d 1461d 22/29 fixed on 2023/02/24 13:50
upstream KMSAN: uninit-value in IP6_ECN_decapsulate net 7 C 981 811d 2727d 25/29 fixed on 2023/12/21 03:45
upstream general protection fault in ip_route_output_key_hash_rcu net 2 46 2394d 2423d 0/29 closed as invalid on 2019/10/03 03:38
linux-4.19 general protection fault in ip_route_output_key_hash_rcu 2 2 2401d 2408d 0/1 auto-closed as invalid on 2019/12/10 05:04
upstream KMSAN: uninit-value in ip_route_output_key_hash_rcu (2) net 7 1 2854d 2854d 0/29 closed as invalid on 2018/06/27 15:18
upstream KMSAN: uninit-value in ip_route_output_key_hash_rcu (3) net 7 2 2179d 2204d 0/29 auto-closed as invalid on 2020/06/19 03:56
upstream KMSAN: uninit-value in ip_route_output_key_hash_rcu net 7 179 2862d 2893d 5/29 fixed on 2018/05/08 18:30

Sample crash report:
BUG: unable to handle page fault for address: ffffed101acc9400
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 17fff6067 P4D 17fff6067 PUD 7ffd6067 PMD 0 
Oops: Oops: 0000 [#1] SMP KASAN NOPTI
CPU: 3 UID: 0 PID: 6079 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline]
RIP: 0010:ip_route_output_key_hash_rcu+0x6c0/0x2870 net/ipv4/route.c:2875
Code: 24 30 48 85 ed 0f 84 91 14 00 00 e8 5a 69 1b f8 48 83 c5 30 e8 51 69 1b f8 48 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 06 1e 00 00 48 8b 6d 00 e8 3d 39 a2 01 31 ff 41
RSP: 0018:ffffc900059d6ca8 EFLAGS: 00010a06
RAX: dffffc0000000000 RBX: ffffc900059d6ef8 RCX: ffffffff89ed4ad2
RDX: 1ffff1101acc9400 RSI: ffffffff89ed360f RDI: ffff88802c665658
RBP: ffff8880d664a000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88802c665620
R13: ffff88803a439c00 R14: ffffc900059d6d58 R15: ffff88803230a000
FS:  000055558dc94500(0000) GS:ffff8880d664a000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed101acc9400 CR3: 000000002ca2a000 CR4: 0000000000352ef0
Call Trace:
 <TASK>
 ip_route_output_key_hash+0x118/0x2b0 net/ipv4/route.c:2705
 __ip_route_output_key include/net/route.h:169 [inline]
 ip_route_output_flow+0x27/0x150 net/ipv4/route.c:2932
 ip_route_output_key include/net/route.h:179 [inline]
 sctp_v4_get_dst+0x3c4/0x1220 net/sctp/protocol.c:455
 sctp_transport_route+0x131/0x360 net/sctp/transport.c:448
 sctp_ootb_pkt_new+0x24c/0x440 net/sctp/sm_statefuns.c:6437
 sctp_sf_abort_violation+0x792/0xcf0 net/sctp/sm_statefuns.c:4771
 sctp_sf_violation_chunklen net/sctp/sm_statefuns.c:4830 [inline]
 sctp_sf_ootb+0x45c/0x870 net/sctp/sm_statefuns.c:3721
 sctp_do_sm+0x17a/0x5be0 net/sctp/sm_sideeffect.c:1172
 sctp_endpoint_bh_rcv+0x43f/0x880 net/sctp/endpointola.c:408
 sctp_inq_push+0x1db/0x280 net/sctp/inqueue.c:88
 sctp_rcv+0x13e1/0x3c30 net/sctp/input.c:243
 ip_protocol_deliver_rcu+0x44c/0x4d0 net/ipv4/ip_input.c:207
 ip_local_deliver_finish+0x3f2/0x6e0 net/ipv4/ip_input.c:241
 NF_HOOK include/linux/netfilter.h:318 [inline]
 NF_HOOK include/linux/netfilter.h:312 [inline]
 ip_local_deliver+0x19a/0x1f0 net/ipv4/ip_input.c:262
 dst_input include/net/dst.h:480 [inline]
 ip_rcv_finish net/ipv4/ip_input.c:453 [inline]
 NF_HOOK include/linux/netfilter.h:318 [inline]
 NF_HOOK include/linux/netfilter.h:312 [inline]
 ip_rcv+0x2d9/0x5d0 net/ipv4/ip_input.c:573
 __netif_receive_skb_one_core+0x197/0x1e0 net/core/dev.c:6156
 __netif_receive_skb+0x1f/0x120 net/core/dev.c:6269
 netif_receive_skb_internal net/core/dev.c:6355 [inline]
 netif_receive_skb+0x139/0x820 net/core/dev.c:6414
 tun_rx_batched.isra.0+0x3f6/0x750 drivers/net/tun.c:1509
 tun_get_user+0x1e2e/0x3e10 drivers/net/tun.c:1953
 tun_chr_write_iter+0xdc/0x200 drivers/net/tun.c:1999
 new_sync_write fs/read_write.c:595 [inline]
 vfs_write+0x6ac/0x1070 fs/read_write.c:688
 ksys_write+0x12a/0x250 fs/read_write.c:740
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2a9979c629
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffec6c44e78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f2a99a15fa0 RCX: 00007f2a9979c629
RDX: 000000000000004e RSI: 0000200000000280 RDI: 0000000000000004
RBP: 00007f2a99832b39 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f2a99a15fac R14: 00007f2a99a15fa0 R15: 00007f2a99a15fa0
 </TASK>
Modules linked in:
CR2: ffffed101acc9400
---[ end trace 0000000000000000 ]---
RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline]
RIP: 0010:ip_route_output_key_hash_rcu+0x6c0/0x2870 net/ipv4/route.c:2875
Code: 24 30 48 85 ed 0f 84 91 14 00 00 e8 5a 69 1b f8 48 83 c5 30 e8 51 69 1b f8 48 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 06 1e 00 00 48 8b 6d 00 e8 3d 39 a2 01 31 ff 41
RSP: 0018:ffffc900059d6ca8 EFLAGS: 00010a06
RAX: dffffc0000000000 RBX: ffffc900059d6ef8 RCX: ffffffff89ed4ad2
RDX: 1ffff1101acc9400 RSI: ffffffff89ed360f RDI: ffff88802c665658
RBP: ffff8880d664a000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88802c665620
R13: ffff88803a439c00 R14: ffffc900059d6d58 R15: ffff88803230a000
FS:  000055558dc94500(0000) GS:ffff8880d664a000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffed101acc9400 CR3: 000000002ca2a000 CR4: 0000000000352ef0
----------------
Code disassembly (best guess):
   0:	24 30                	and    $0x30,%al
   2:	48 85 ed             	test   %rbp,%rbp
   5:	0f 84 91 14 00 00    	je     0x149c
   b:	e8 5a 69 1b f8       	call   0xf81b696a
  10:	48 83 c5 30          	add    $0x30,%rbp
  14:	e8 51 69 1b f8       	call   0xf81b696a
  19:	48 89 ea             	mov    %rbp,%rdx
  1c:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  23:	fc ff df
  26:	48 c1 ea 03          	shr    $0x3,%rdx
* 2a:	80 3c 02 00          	cmpb   $0x0,(%rdx,%rax,1) <-- trapping instruction
  2e:	0f 85 06 1e 00 00    	jne    0x1e3a
  34:	48 8b 6d 00          	mov    0x0(%rbp),%rbp
  38:	e8 3d 39 a2 01       	call   0x1a2397a
  3d:	31 ff                	xor    %edi,%edi
  3f:	41                   	rex.B

Crashes (910):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/02/22 07:19 upstream 32a92f8c8932 6e7b5511 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2025/11/22 04:21 upstream 2eba5e05d9bc 4fb8ef37 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2025/08/13 05:12 upstream 0e39a731820a 22ec1469 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/03/05 07:55 upstream ecc64d2dc9ff a9fe5c9e .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/03/01 18:02 upstream eb71ab2bf722 43249bac .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/28 06:18 upstream 4d349ee5c778 43249bac .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/28 01:34 upstream a75cb869a8cc 2cf092b8 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/22 19:35 upstream 32a92f8c8932 6e7b5511 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/21 09:49 upstream a95f71ad3e2e 6e7b5511 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/20 07:08 upstream 8bf22c33e7a1 17d780d6 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 06:39 upstream 23b0f90ba871 746545b8 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/18 23:01 upstream 23b0f90ba871 77d4d919 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/18 16:35 upstream 2961f841b025 77d4d919 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/18 11:38 upstream 2961f841b025 39751c21 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/10 20:02 upstream 72c395024dac a076df6f .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/24 19:01 upstream 7dff99b35460 96b1aa46 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/24 17:26 upstream 7dff99b35460 96b1aa46 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/22 08:37 upstream 32a92f8c8932 6e7b5511 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/21 13:36 upstream a95f71ad3e2e 6e7b5511 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64-mte BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/20 21:37 upstream 8bf22c33e7a1 741f5161 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/20 01:57 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/20 00:45 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 23:15 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 21:15 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 20:08 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 18:32 upstream 2b7a25df823d 73a252ac .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 13:35 upstream 956b9cbd7f15 746545b8 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64-mte BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 09:40 upstream 956b9cbd7f15 746545b8 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 01:08 upstream 23b0f90ba871 77d4d919 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/18 17:16 upstream 2961f841b025 77d4d919 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/18 00:02 upstream d295082ea672 4db8fa92 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/01/30 22:01 upstream 4d310797262f ea6dba22 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/09 09:27 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 59e4d31a0470 4c131dc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: unable to handle kernel paging request in ip_route_output_key_hash_rcu
2026/02/19 14:43 upstream c22e26bd0906 746545b8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in ip_route_output_key_hash_rcu
2026/02/01 17:59 upstream 162b42445b58 6b8752f2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/01 04:11 upstream ad9a728a3388 35764559 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in ip_route_output_key_hash_rcu
2026/01/15 03:42 upstream 944aacb68baf d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-root KMSAN: uninit-value in ip_route_output_key_hash_rcu
2026/02/09 12:06 upstream 05f7e89ab973 df949cd9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in ip_route_output_key_hash_rcu
2026/01/04 20:55 upstream 54e82e93ca93 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kmsan-gce-386-root KMSAN: uninit-value in ip_route_output_key_hash_rcu
2026/02/18 08:51 net 77c5e3fdd279 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 18:30 net 22069735ff6d 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 18:30 net 22069735ff6d 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/19 11:27 net-next 37a93dd5c49b 746545b8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/19 09:34 net-next 37a93dd5c49b 746545b8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/19 08:19 net-next 37a93dd5c49b 746545b8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/19 02:39 net-next 37a93dd5c49b 77d4d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/19 00:06 net-next 37a93dd5c49b 77d4d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 20:37 net-next 37a93dd5c49b 77d4d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 19:35 net-next 37a93dd5c49b 77d4d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 13:56 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 13:02 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 10:23 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 06:14 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 04:16 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 02:37 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/18 01:17 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 22:56 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 22:44 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 21:43 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 20:43 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 19:32 net-next 37a93dd5c49b 39751c21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 13:24 net-next 37a93dd5c49b e439b951 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 06:21 net-next 37a93dd5c49b e439b951 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/17 03:46 net-next 37a93dd5c49b 5d52cba5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/16 22:47 net-next 37a93dd5c49b 5d52cba5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/02/15 19:25 net-next 37a93dd5c49b 1e62d198 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in ip_route_output_key_hash_rcu
2026/01/05 14:08 linux-next f8f97927abf7 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in ip_route_output_key_hash_rcu
2026/02/06 09:57 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 59e4d31a0470 f03c4191 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: vmalloc-out-of-bounds Read in ip_route_output_key_hash_rcu
* Struck through repros no longer work on HEAD.