syzbot


KASAN: use-after-free Read in __xfrm_state_insert

Status: upstream: reported on 2025/07/29 07:08
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+409c1e76795047429447@syzkaller.appspotmail.com
First crash: 83d, last: 14m
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [net?] KASAN: use-after-free Read in __xfrm_state_insert 0 (1) 2025/07/29 07:08
Similar bugs (1)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.6 general protection fault in __xfrm_state_insert 19 2 8d04h 25d 0/2 upstream: reported on 2025/09/05 19:36

Sample crash report:
==================================================================
BUG: KASAN: use-after-free in __xfrm_state_insert+0x8af/0x1450 net/xfrm/xfrm_state.c:1743
Read of size 1 at addr ffff88805a953a70 by task syz.2.2838/16678

CPU: 0 UID: 0 PID: 16678 Comm: syz.2.2838 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __xfrm_state_insert+0x8af/0x1450 net/xfrm/xfrm_state.c:1743
 xfrm_state_insert+0x54/0x60 net/xfrm/xfrm_state.c:1795
 ipcomp6_tunnel_attach net/ipv6/ipcomp6.c:131 [inline]
 ipcomp6_init_state+0x655/0x900 net/ipv6/ipcomp6.c:163
 __xfrm_init_state+0xa73/0x13f0 net/xfrm/xfrm_state.c:3188
 xfrm_init_state+0x18/0xa0 net/xfrm/xfrm_state.c:3231
 pfkey_msg2xfrm_state net/key/af_key.c:1286 [inline]
 pfkey_add+0x1d38/0x2e00 net/key/af_key.c:1504
 pfkey_process net/key/af_key.c:2848 [inline]
 pfkey_sendmsg+0xbfe/0x1090 net/key/af_key.c:3699
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:729
 ____sys_sendmsg+0x52d/0x830 net/socket.c:2614
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668
 __sys_sendmmsg+0x227/0x430 net/socket.c:2757
 __do_sys_sendmmsg net/socket.c:2784 [inline]
 __se_sys_sendmmsg net/socket.c:2781 [inline]
 __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2781
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2e0f98eec9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f2e108c3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f2e0fbe6090 RCX: 00007f2e0f98eec9
RDX: 000000000400008a RSI: 0000200000000180 RDI: 0000000000000004
RBP: 00007f2e0fa11f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f2e0fbe6128 R14: 00007f2e0fbe6090 R15: 00007ffe74fc7568
 </TASK>

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5a953
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 14609, tgid 14608 (syz.0.2287), ts 330438241354, free_ts 378336026589
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851
 prep_new_page mm/page_alloc.c:1859 [inline]
 get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858
 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148
 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416
 alloc_slab_page mm/slub.c:2492 [inline]
 allocate_slab+0x8a/0x370 mm/slub.c:2660
 new_slab mm/slub.c:2714 [inline]
 ___slab_alloc+0xbeb/0x1420 mm/slub.c:3901
 __slab_alloc mm/slub.c:3992 [inline]
 __slab_alloc_node mm/slub.c:4067 [inline]
 slab_alloc_node mm/slub.c:4228 [inline]
 kmem_cache_alloc_node_noprof+0x280/0x3c0 mm/slub.c:4292
 kmalloc_reserve+0xbd/0x290 net/core/skbuff.c:579
 __alloc_skb+0x142/0x2d0 net/core/skbuff.c:670
 alloc_skb include/linux/skbuff.h:1377 [inline]
 alloc_uevent_skb+0x7d/0x230 lib/kobject_uevent.c:289
 uevent_net_broadcast_tagged lib/kobject_uevent.c:352 [inline]
 kobject_uevent_net_broadcast+0x184/0x560 lib/kobject_uevent.c:413
 kobject_uevent_env+0x55b/0x8c0 lib/kobject_uevent.c:608
 rx_queue_add_kobject net/core/net-sysfs.c:1280 [inline]
 net_rx_queue_update_kobjects+0x3e5/0x740 net/core/net-sysfs.c:1322
 register_queue_kobjects net/core/net-sysfs.c:2114 [inline]
 netdev_register_kobject+0x21f/0x310 net/core/net-sysfs.c:2362
 register_netdevice+0x126c/0x1ae0 net/core/dev.c:11287
 __ip_tunnel_create+0x3e7/0x560 net/ipv4/ip_tunnel.c:268
page last free pid 9802 tgid 9802 stack trace:
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1395 [inline]
 __free_frozen_pages+0xbc4/0xd30 mm/page_alloc.c:2895
 __slab_free+0x303/0x3c0 mm/slub.c:4606
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x97/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x148/0x160 mm/kasan/quarantine.c:286
 __kasan_slab_alloc+0x22/0x80 mm/kasan/common.c:340
 kasan_slab_alloc include/linux/kasan.h:250 [inline]
 slab_post_alloc_hook mm/slub.c:4191 [inline]
 slab_alloc_node mm/slub.c:4240 [inline]
 kmem_cache_alloc_noprof+0x1c1/0x3c0 mm/slub.c:4247
 lsm_inode_alloc security/security.c:755 [inline]
 security_inode_alloc+0x39/0x330 security/security.c:1697
 inode_init_always_gfp+0x9ed/0xdc0 fs/inode.c:306
 inode_init_always include/linux/fs.h:3309 [inline]
 alloc_inode+0x82/0x1b0 fs/inode.c:353
 new_inode_pseudo include/linux/fs.h:3392 [inline]
 sock_alloc net/socket.c:624 [inline]
 __sock_create+0x12d/0x9f0 net/socket.c:1553
 rds_tcp_conn_path_connect+0x282/0x680 net/rds/tcp_connect.c:-1
 rds_connect_worker+0x1d5/0x290 net/rds/threads.c:176
 process_one_work kernel/workqueue.c:3236 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x70e/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x439/0x7d0 arch/x86/kernel/process.c:148

Memory state around the buggy address:
 ffff88805a953900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff88805a953980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff88805a953a00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                             ^
 ffff88805a953a80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff88805a953b00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================

Crashes (1999):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/09/23 05:17 net-next 78e87f9d5358 0ac7291c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: use-after-free Read in __xfrm_state_insert
2025/07/26 02:06 net-next 9312ee76490d fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: use-after-free Read in __xfrm_state_insert
2025/07/09 17:20 linux-next 835244aba90d f4e5e155 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: use-after-free Read in __xfrm_state_insert
2025/09/25 21:47 upstream bf40f4b87761 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce general protection fault in __xfrm_state_insert
2025/09/25 00:33 upstream 4ea5af085908 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root general protection fault in __xfrm_state_insert
2025/09/24 15:17 upstream cec1e6e5d1ab 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root general protection fault in __xfrm_state_insert
2025/09/19 12:53 upstream 097a6c336d00 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root general protection fault in __xfrm_state_insert
2025/09/04 18:57 upstream 08b06c30a445 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root general protection fault in __xfrm_state_insert
2025/08/14 14:29 upstream 0cc53520e68b dcc075fb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root BUG: unable to handle kernel paging request in __xfrm_state_insert
2025/09/25 07:09 upstream 4ea5af085908 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/10 23:10 upstream 7aac71907bde fdeaa69b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream general protection fault in __xfrm_state_insert
2025/09/22 18:23 upstream 07e27ad16399 770ff59f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: unable to handle kernel NULL pointer dereference in __xfrm_state_insert
2025/09/10 15:38 upstream 9dd1835ecda5 fdeaa69b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/10 02:53 upstream 9dd1835ecda5 fdeaa69b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: unable to handle kernel NULL pointer dereference in __xfrm_state_insert
2025/08/08 21:35 upstream bec077162bd0 56444e07 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64-mte KASAN: invalid-access Read in __xfrm_state_insert
2025/09/29 14:08 bpf bf40f4b87761 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 10:32 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 08:26 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce general protection fault in __xfrm_state_insert
2025/09/29 06:47 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 05:21 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 02:00 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 23:05 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 19:44 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 05:11 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 03:15 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 22:59 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 20:41 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 12:15 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 03:02 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce general protection fault in __xfrm_state_insert
2025/09/27 01:10 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/26 23:54 bpf bf40f4b87761 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce general protection fault in __xfrm_state_insert
2025/09/24 11:38 bpf f36caa7c14f4 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce KASAN: slab-use-after-free Write in __xfrm_state_insert
2025/09/22 22:18 net 3491bb7dae5c 0ac7291c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce general protection fault in __xfrm_state_insert
2025/10/01 02:51 bpf-next 4ef77dd584cf 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/30 20:14 bpf-next 4ef77dd584cf 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/30 19:10 bpf-next 4ef77dd584cf 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/30 16:20 bpf-next 4ef77dd584cf 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/30 15:06 bpf-next 4ef77dd584cf 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/30 12:35 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/30 10:04 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/30 05:05 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/30 03:34 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/30 01:28 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 23:32 bpf-next 4ef77dd584cf 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 09:28 bpf-next 4ef77dd584cf 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/29 00:57 bpf-next 4ef77dd584cf 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 21:59 bpf-next 4ef77dd584cf 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 21:12 bpf-next 4ef77dd584cf 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 18:36 bpf-next 4ef77dd584cf 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 16:02 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 14:01 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/28 12:27 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 10:04 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 08:09 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 05:29 bpf-next 0e8e60e86cf3 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/28 00:09 bpf-next 0cc114dc358c 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 19:20 bpf-next 0cc114dc358c 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 10:28 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 08:46 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/27 07:30 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/27 06:59 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 05:58 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/27 04:11 bpf-next 991e555efffd 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/26 21:45 bpf-next 991e555efffd 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce general protection fault in __xfrm_state_insert
2025/09/26 16:56 bpf-next d43029ff7d1b 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/09/25 09:01 net-next 5e3fee34f626 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce general protection fault in __xfrm_state_insert
2025/08/27 04:37 net-next 3c14917953a5 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce KASAN: slab-out-of-bounds Read in __xfrm_state_insert
2025/08/17 02:16 bpf-next 3ec85602f86c 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce KFENCE: use-after-free read in __xfrm_state_insert
2025/09/03 13:32 linux-next 5d50cf9f7cf2 96a211bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/08/30 01:34 linux-next 7fa4d8dc380f 807a3b61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce KASAN: slab-use-after-free Read in __xfrm_state_insert
2025/07/17 17:56 linux-next 024e09e444bd 0d1223f1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce general protection fault in __xfrm_state_insert
2025/09/23 02:46 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5db4add5e77 0ac7291c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: null-ptr-deref Write in __xfrm_state_insert
2025/09/20 01:07 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 506ba4ea4cf5 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 KASAN: null-ptr-deref Write in __xfrm_state_insert
2025/09/27 14:17 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git for-next 41d7b9d85379 001c9061 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 KASAN: slab-use-after-free Read in __xfrm_state_insert
* Struck through repros no longer work on HEAD.