[   11.481056][  T283] veth0: renamed from veth-rt-1
[   12.255068][  T291] veth0: renamed from veth-rt-2
[   52.627574][   T67] ==================================================================
[   52.627906][   T67] BUG: KASAN: slab-use-after-free in cleanup_net+0xa5d/0xb90
[   52.628221][   T67] Read of size 8 at addr ffff88800cdc80f8 by task kworker/u16:1/67
[   52.628514][   T67] 
[   52.628627][   T67] CPU: 1 UID: 0 PID: 67 Comm: kworker/u16:1 Not tainted 6.12.0-virtme #1
[   52.628932][   T67] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[   52.629194][   T67] Workqueue: netns cleanup_net
[   52.629413][   T67] Call Trace:
[   52.629568][   T67]  <TASK>
[   52.629688][   T67]  dump_stack_lvl+0x82/0xd0
[   52.629902][   T67]  print_address_description.constprop.0+0x2c/0x3b0
[   52.630166][   T67]  ? cleanup_net+0xa5d/0xb90
[   52.630374][   T67]  print_report+0xb4/0x270
[   52.630574][   T67]  ? kasan_addr_to_slab+0x25/0x80
[   52.630778][   T67]  kasan_report+0xbd/0xf0
[   52.630897][   T67]  ? cleanup_net+0xa5d/0xb90
[   52.631039][   T67]  cleanup_net+0xa5d/0xb90
[   52.631177][   T67]  ? __pfx_lock_acquire.part.0+0x10/0x10
[   52.631356][   T67]  ? __pfx_cleanup_net+0x10/0x10
[   52.631551][   T67]  ? trace_lock_acquire+0x148/0x1f0
[   52.631760][   T67]  ? lock_acquire+0x32/0xc0
[   52.631964][   T67]  ? process_one_work+0xe0b/0x16d0
[   52.632176][   T67]  process_one_work+0xe55/0x16d0
[   52.632383][   T67]  ? __pfx___lock_release+0x10/0x10
[   52.632531][   T67]  ? __pfx_process_one_work+0x10/0x10
[   52.632673][   T67]  ? assign_work+0x16c/0x240
[   52.632823][   T67]  worker_thread+0x58c/0xce0
[   52.633026][   T67]  ? lockdep_hardirqs_on_prepare+0x275/0x410
[   52.633265][   T67]  ? __pfx_worker_thread+0x10/0x10
[   52.633416][   T67]  ? __pfx_worker_thread+0x10/0x10
[   52.633608][   T67]  kthread+0x28a/0x350
[   52.633774][   T67]  ? __pfx_kthread+0x10/0x10
[   52.633975][   T67]  ret_from_fork+0x31/0x70
[   52.634179][   T67]  ? __pfx_kthread+0x10/0x10
[   52.634378][   T67]  ret_from_fork_asm+0x1a/0x30
[   52.634585][   T67]  </TASK>
[   52.634740][   T67] 
[   52.634845][   T67] Allocated by task 268:
[   52.634994][   T67]  kasan_save_stack+0x24/0x50
[   52.635206][   T67]  kasan_save_track+0x14/0x30
[   52.635379][   T67]  __kasan_slab_alloc+0x59/0x70
[   52.635518][   T67]  kmem_cache_alloc_noprof+0x10b/0x350
[   52.635660][   T67]  copy_net_ns+0xc6/0x540
[   52.635772][   T67]  create_new_namespaces+0x35f/0x920
[   52.635975][   T67]  unshare_nsproxy_namespaces+0x8a/0x1b0
[   52.636174][   T67]  ksys_unshare+0x2c4/0x6e0
[   52.636377][   T67]  __x64_sys_unshare+0x31/0x40
[   52.636579][   T67]  do_syscall_64+0xc1/0x1d0
[   52.636786][   T67]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   52.637035][   T67] 
[   52.637140][   T67] Freed by task 67:
[   52.637287][   T67]  kasan_save_stack+0x24/0x50
[   52.637436][   T67]  kasan_save_track+0x14/0x30
[   52.637575][   T67]  kasan_save_free_info+0x3b/0x60
[   52.637713][   T67]  __kasan_slab_free+0x38/0x50
[   52.637855][   T67]  kmem_cache_free+0xf8/0x330
[   52.637994][   T67]  cleanup_net+0x5a8/0xb90
[   52.638130][   T67]  process_one_work+0xe55/0x16d0
[   52.638275][   T67]  worker_thread+0x58c/0xce0
[   52.638474][   T67]  kthread+0x28a/0x350
[   52.638604][   T67]  ret_from_fork+0x31/0x70
[   52.638745][   T67]  ret_from_fork_asm+0x1a/0x30
[   52.638883][   T67] 
[   52.638955][   T67] Last potentially related work creation:
[   52.639093][   T67]  kasan_save_stack+0x24/0x50
[   52.639236][   T67]  __kasan_record_aux_stack+0x8e/0xa0
[   52.639388][   T67]  insert_work+0x34/0x230
[   52.639540][   T67]  __queue_work+0x5fd/0xa40
[   52.639742][   T67]  queue_delayed_work_on+0x8c/0xa0
[   52.639944][   T67]  __inet_insert_ifa+0x751/0xb10
[   52.640147][   T67]  inetdev_event+0xb18/0xcf0
[   52.640349][   T67]  notifier_call_chain+0xcd/0x150
[   52.640555][   T67]  __dev_notify_flags+0xe6/0x250
[   52.640762][   T67]  dev_change_flags+0xec/0x160
[   52.640960][   T67]  do_setlink.constprop.0+0x79d/0x2300
[   52.641168][   T67]  rtnl_newlink+0x6de/0xa80
[   52.641373][   T67]  rtnetlink_rcv_msg+0x712/0xc10
[   52.641580][   T67]  netlink_rcv_skb+0x130/0x360
[   52.641791][   T67]  netlink_unicast+0x44b/0x710
[   52.641991][   T67]  netlink_sendmsg+0x723/0xbe0
[   52.642193][   T67]  ____sys_sendmsg+0x7ac/0xa10
[   52.642400][   T67]  ___sys_sendmsg+0xee/0x170
[   52.642602][   T67]  __sys_sendmsg+0x109/0x1a0
[   52.642807][   T67]  do_syscall_64+0xc1/0x1d0
[   52.643011][   T67]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   52.643264][   T67] 
[   52.643369][   T67] The buggy address belongs to the object at ffff88800cdc8040
[   52.643369][   T67]  which belongs to the cache net_namespace of size 6528
[   52.643911][   T67] The buggy address is located 184 bytes inside of
[   52.643911][   T67]  freed 6528-byte region [ffff88800cdc8040, ffff88800cdc99c0)
[   52.644396][   T67] 
[   52.644500][   T67] The buggy address belongs to the physical page:
[   52.644749][   T67] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcdc8
[   52.645111][   T67] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   52.645420][   T67] flags: 0x80000000000040(head|node=0|zone=1)
[   52.645684][   T67] page_type: f5(slab)
[   52.645840][   T67] raw: 0080000000000040 ffff888001975240 ffff88800197a0a8 ffff88800197a0a8
[   52.646101][   T67] raw: 0000000000000000 0000000000040004 00000001f5000000 0000000000000000
[   52.646381][   T67] head: 0080000000000040 ffff888001975240 ffff88800197a0a8 ffff88800197a0a8
[   52.646736][   T67] head: 0000000000000000 0000000000040004 00000001f5000000 0000000000000000
[   52.647084][   T67] head: 0080000000000003 ffffea0000337201 ffffffffffffffff 0000000000000000
[   52.647393][   T67] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   52.647719][   T67] page dumped because: kasan: bad access detected
[   52.647889][   T67] 
[   52.647958][   T67] Memory state around the buggy address:
[   52.648098][   T67]  ffff88800cdc7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.648310][   T67]  ffff88800cdc8000: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   52.648539][   T67] >ffff88800cdc8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.648834][   T67]                                                                 ^
[   52.649121][   T67]  ffff88800cdc8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.649409][   T67]  ffff88800cdc8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.649683][   T67] ==================================================================
[   52.650027][   T67] Disabling lock debugging due to kernel taint