BUG: KASAN: null-ptr-deref in atomic_read include/asm-generic/atomic-instrumented.h:26 [inline] BUG: KASAN: null-ptr-deref in __tcf_idr_release net/sched/act_api.c:162 [inline] BUG: KASAN: null-ptr-deref in tcf_idrinfo_destroy+0xb9/0x220 net/sched/act_api.c:561 CPU: 0 PID: 7 Comm: kworker/u4:0 Not tainted 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 __dump_stack+0x1e/0x20 lib/dump_stack.c:77 dump_stack+0x15b/0x1b8 lib/dump_stack.c:118 check_memory_region_inline mm/kasan/generic.c:141 [inline] check_memory_region+0x274/0x280 mm/kasan/generic.c:191 atomic_read include/asm-generic/atomic-instrumented.h:26 [inline] __tcf_idr_release net/sched/act_api.c:162 [inline] tcf_idrinfo_destroy+0xb9/0x220 net/sched/act_api.c:561 process_one_work+0x73b/0xcc0 kernel/workqueue.c:2290 kthread+0x31e/0x3a0 kernel/kthread.c:288 kasan: GPF could be caused by NULL-ptr deref or user memory access CPU: 0 PID: 7 Comm: kworker/u4:0 Tainted: G B 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 Workqueue: netns cleanup_net Code: 40 e8 b4 6b af 00 48 85 c0 0f 84 1a 01 00 00 49 89 c4 4c 8d 68 20 4c 89 ef be 04 00 00 00 e8 37 05 1b fe 4c 89 e8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 0f 85 ba 00 00 00 45 8b 6d 00 31 ff 44 89 ee RAX: 0000000000000002 RBX: ffff8881d601bfa0 RCX: ffff8881f5d6af40 RBP: ffff8881f5db7c08 R08: 0000000000000004 R09: 0000000000000003 R13: 0000000000000010 R14: ffffffff861b59f0 R15: dffffc0000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Call Trace: CR2: 00007f53408d3d60 CR3: 00000001ec87e000 CR4: 00000000003406a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 40 e8 b4 6b af 00 rex call 0xaf6bba 6: 48 85 c0 test %rax,%rax 9: 0f 84 1a 01 00 00 je 0x129 f: 49 89 c4 mov %rax,%r12 12: 4c 8d 68 20 lea 0x20(%rax),%r13 16: 4c 89 ef mov %r13,%rdi 19: be 04 00 00 00 mov $0x4,%esi 1e: e8 37 05 1b fe call 0xfe1b055a 23: 4c 89 e8 mov %r13,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 0f b6 04 38 movzbl (%rax,%r15,1),%eax <-- trapping instruction 2f: 84 c0 test %al,%al 31: 0f 85 ba 00 00 00 jne 0xf1 37: 45 8b 6d 00 mov 0x0(%r13),%r13d 3b: 31 ff xor %edi,%edi 3d: 44 89 ee mov %r13d,%esi