syzbot


KASAN: use-after-free Read in __xfrm_state_insert

Status: upstream: reported on 2025/07/29 07:08
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+409c1e76795047429447@syzkaller.appspotmail.com
First crash: 50d, last: now
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] KASAN: use-after-free Read in __xfrm_state_insert 0 (1) 2025/07/29 07:08

Sample crash report:
==================================================================
BUG: KASAN: use-after-free in __xfrm_state_insert+0x24fc/0x2510 net/xfrm/xfrm_state.c:1743
Read of size 1 at addr ffff888052253630 by task syz.5.7775/6514

CPU: 1 UID: 0 PID: 6514 Comm: syz.5.7775 Not tainted 6.16.0-syzkaller-12063-g37816488247d #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcd/0x630 mm/kasan/report.c:482
 kasan_report+0xe0/0x110 mm/kasan/report.c:595
 __xfrm_state_insert+0x24fc/0x2510 net/xfrm/xfrm_state.c:1743
 xfrm_state_insert+0x4c/0x60 net/xfrm/xfrm_state.c:1795
 ipcomp6_tunnel_attach net/ipv6/ipcomp6.c:131 [inline]
 ipcomp6_init_state net/ipv6/ipcomp6.c:163 [inline]
 ipcomp6_init_state+0x608/0x8d0 net/ipv6/ipcomp6.c:141
 __xfrm_init_state+0x6fe/0x1c10 net/xfrm/xfrm_state.c:3188
 xfrm_init_state+0x18/0xa0 net/xfrm/xfrm_state.c:3231
 pfkey_msg2xfrm_state net/key/af_key.c:1286 [inline]
 pfkey_add+0x24f4/0x2ec0 net/key/af_key.c:1504
 pfkey_process+0x6d9/0x840 net/key/af_key.c:2848
 pfkey_sendmsg+0x435/0x850 net/key/af_key.c:3699
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg net/socket.c:729 [inline]
 ____sys_sendmsg+0xa98/0xc70 net/socket.c:2614
 ___sys_sendmsg+0x134/0x1d0 net/socket.c:2668
 __sys_sendmmsg+0x2f9/0x420 net/socket.c:2750
 __compat_sys_sendmmsg net/compat.c:360 [inline]
 __do_compat_sys_sendmmsg net/compat.c:367 [inline]
 __se_compat_sys_sendmmsg net/compat.c:364 [inline]
 __ia32_compat_sys_sendmmsg+0x9d/0x100 net/compat.c:364
 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
 __do_fast_syscall_32+0x7c/0x3a0 arch/x86/entry/syscall_32.c:306
 do_fast_syscall_32+0x32/0x80 arch/x86/entry/syscall_32.c:331
 entry_SYSENTER_compat_after_hwframe+0x84/0x8e
RIP: 0023:0xf70fe579
Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
RSP: 002b:00000000f54ac55c EFLAGS: 00000296 ORIG_RAX: 0000000000000159
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000080000180
RDX: 000000000400008a RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 </TASK>

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffffffffffffffff pfn:0x52253
flags: 0x4fff00000000000(node=1|zone=1|lastcpupid=0x7ff)
raw: 04fff00000000000 0000000000000000 00000000ffffffff 0000000000000000
raw: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 6464, tgid 6464 (modprobe), ts 1263560135078, free_ts 1266264311160
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x1c0/0x230 mm/page_alloc.c:1851
 prep_new_page mm/page_alloc.c:1859 [inline]
 get_page_from_freelist+0x132b/0x38e0 mm/page_alloc.c:3858
 __alloc_frozen_pages_noprof+0x261/0x23f0 mm/page_alloc.c:5148
 alloc_pages_mpol+0x1fb/0x550 mm/mempolicy.c:2416
 alloc_slab_page mm/slub.c:2487 [inline]
 allocate_slab mm/slub.c:2655 [inline]
 new_slab+0x247/0x330 mm/slub.c:2709
 ___slab_alloc+0xcf2/0x1740 mm/slub.c:3891
 __slab_alloc.constprop.0+0x56/0xb0 mm/slub.c:3981
 __slab_alloc_node mm/slub.c:4056 [inline]
 slab_alloc_node mm/slub.c:4217 [inline]
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kmalloc_noprof+0x2f2/0x510 mm/slub.c:4377
 kmalloc_noprof include/linux/slab.h:909 [inline]
 tomoyo_realpath_from_path+0xc2/0x6e0 security/tomoyo/realpath.c:251
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_path_perm+0x274/0x460 security/tomoyo/file.c:822
 security_inode_getattr+0x116/0x290 security/security.c:2377
 vfs_getattr fs/stat.c:259 [inline]
 vfs_fstat+0x4b/0xe0 fs/stat.c:281
 __do_sys_newfstat+0x87/0x100 fs/stat.c:555
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
page last free pid 16327 tgid 16327 stack trace:
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1395 [inline]
 __free_frozen_pages+0x7d5/0x10f0 mm/page_alloc.c:2895
 discard_slab mm/slub.c:2753 [inline]
 __put_partials+0x165/0x1c0 mm/slub.c:3218
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x4d/0x120 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x195/0x1e0 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x69/0x90 mm/kasan/common.c:340
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4180 [inline]
 slab_alloc_node mm/slub.c:4229 [inline]
 kmem_cache_alloc_noprof+0x1cb/0x3b0 mm/slub.c:4236
 getname_flags.part.0+0x4c/0x550 fs/namei.c:146
 getname_flags include/linux/audit.h:322 [inline]
 getname include/linux/fs.h:2918 [inline]
 __do_sys_unlink fs/namei.c:4696 [inline]
 __se_sys_unlink fs/namei.c:4694 [inline]
 __ia32_sys_unlink+0xaf/0x110 fs/namei.c:4694
 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
 __do_fast_syscall_32+0x7c/0x3a0 arch/x86/entry/syscall_32.c:306
 do_fast_syscall_32+0x32/0x80 arch/x86/entry/syscall_32.c:331
 entry_SYSENTER_compat_after_hwframe+0x84/0x8e

Memory state around the buggy address:
 ffff888052253500: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff888052253580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff888052253600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                     ^
 ffff888052253680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff888052253700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
----------------
Code disassembly (best guess), 2 bytes skipped:
   0:	10 06                	adc    %al,(%rsi)
   2:	03 74 b4 01          	add    0x1(%rsp,%rsi,4),%esi
   6:	10 07                	adc    %al,(%rdi)
   8:	03 74 b0 01          	add    0x1(%rax,%rsi,4),%esi
   c:	10 08                	adc    %cl,(%rax)
   e:	03 74 d8 01          	add    0x1(%rax,%rbx,8),%esi
  1e:	00 51 52             	add    %dl,0x52(%rcx)
  21:	55                   	push   %rbp
  22:	89 e5                	mov    %esp,%ebp
  24:	0f 34                	sysenter
  26:	cd 80                	int    $0x80
* 28:	5d                   	pop    %rbp <-- trapping instruction
  29:	5a                   	pop    %rdx
  2a:	59                   	pop    %rcx
  2b:	c3                   	ret
  2c:	90                   	nop
  2d:	90                   	nop
  2e:	90                   	nop
  2f:	90                   	nop
  30:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
  37:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi

Crashes (715):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/08/09 00:33 upstream 37816488247d 32a0e5ed .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: use-after-free Read in __xfrm_state_insert
2025/07/26 02:06 net-next 9312ee76490d fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: use-after-free Read in __xfrm_state_insert
2025/07/09 17:20 linux-next 835244aba90d f4e5e155 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: use-after-free Read in __xfrm_state_insert
2025/08/28 13:16 upstream 07d9df80082b 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in __xfrm_state_insert
2025/08/28 00:43 upstream 39f90c196721 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 21:24 upstream fab1beda7597 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in __xfrm_state_insert
2025/08/25 12:56 upstream c330cb607721 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in __xfrm_state_insert
2025/08/20 19:59 upstream b19a97d57c15 bd178e57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/14 14:29 upstream 0cc53520e68b dcc075fb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __xfrm_state_insert
2025/08/24 17:33 upstream c330cb607721 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 general protection fault in __xfrm_state_insert
2025/08/27 06:54 upstream fab1beda7597 e12e5ba4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 10:15 upstream 1b237f190eb3 bf27483f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/22 22:27 upstream cf6fc5eefc5b bf27483f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: unable to handle kernel NULL pointer dereference in __xfrm_state_insert
2025/08/08 21:35 upstream bec077162bd0 56444e07 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64-mte KASAN: invalid-access Read in __xfrm_state_insert
2025/08/28 22:45 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 20:14 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 18:40 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 16:49 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/28 15:47 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/28 10:19 net bd2902e0bcac 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 08:02 net bd2902e0bcac e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/28 06:54 net bd2902e0bcac e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/28 05:14 net bd2902e0bcac e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 18:35 net ceb951552404 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 14:16 net 9448ccd85336 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 12:29 net 9448ccd85336 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 11:04 net 9448ccd85336 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 05:47 net 9448ccd85336 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 01:30 net 007a5ffadc4f e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 10:15 net 007a5ffadc4f bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 06:10 net 007a5ffadc4f bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/26 03:59 bpf dd9de524183a bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 00:13 bpf dd9de524183a bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 21:04 net ec79003c5f9d bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/08/25 14:59 bpf dd9de524183a bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 06:53 net ec79003c5f9d bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 05:52 net ec79003c5f9d bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 21:28 net-next d4854be4ec21 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 12:12 bpf-next 737433c6a559 443c11c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 05:36 bpf-next d3abefe89740 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 04:11 bpf-next d3abefe89740 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/28 02:11 net-next 705609dedea1 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 19:35 net-next 242041164339 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 16:49 net-next 242041164339 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 15:31 bpf-next 2465bb83e0b4 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 09:51 net-next 242041164339 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 04:37 net-next 3c14917953a5 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-out-of-bounds Read in __xfrm_state_insert
2025/08/27 04:35 bpf-next d0f27ff27c04 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/27 03:04 bpf-next d0f27ff27c04 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/08/26 23:00 net-next 3c14917953a5 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 16:10 net-next 07ca488d688c bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 13:10 net-next 07ca488d688c bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/26 11:33 net-next 07ca488d688c bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/26 07:58 net-next 992e9f53a0db bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/26 02:38 net-next 992e9f53a0db bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/25 23:07 bpf-next 4223bf833c84 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 17:47 net-next b1c92cdf5af3 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 16:21 net-next b1c92cdf5af3 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 11:25 net-next b1c92cdf5af3 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/25 11:16 net-next b1c92cdf5af3 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/17 02:16 bpf-next 3ec85602f86c 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KFENCE: use-after-free read in __xfrm_state_insert
2025/08/26 19:56 linux-next 7fa4d8dc380f e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce general protection fault in __xfrm_state_insert
2025/08/20 06:07 linux-next 5303936d609e 79512909 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root general protection fault in __xfrm_state_insert
2025/07/17 17:56 linux-next 024e09e444bd 0d1223f1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce general protection fault in __xfrm_state_insert
2025/08/26 18:54 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git for-next 8f5ae30d69d7 e12e5ba4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 KASAN: slab-use-after-free Read in __xfrm_state_insert
* Struck through repros no longer work on HEAD.