[  109.424541][  T855] sctp: Hash tables configured (bind 32/56)
[  139.155115][    C0] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  139.429424][    C3] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  139.680146][    C3] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  139.890245][    C0] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  140.266896][    C1] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  140.430644][    C0] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  140.724502][    C2] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  141.156725][    C3] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  141.421522][    C1] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  141.515990][    C2] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:23456. Sending cookies.
[  178.695412][   T67] ==================================================================
[  178.695693][   T67] BUG: KASAN: slab-use-after-free in cleanup_net+0x932/0xa40
[  178.695911][   T67] Read of size 8 at addr ffff8880095f00f8 by task kworker/u16:1/67
[  178.696163][   T67] 
[  178.696240][   T67] CPU: 3 UID: 0 PID: 67 Comm: kworker/u16:1 Not tainted 6.12.0-virtme #1
[  178.696463][   T67] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[  178.696642][   T67] Workqueue: netns cleanup_net
[  178.696798][   T67] Call Trace:
[  178.696907][   T67]  <TASK>
[  178.697011][   T67]  dump_stack_lvl+0x82/0xd0
[  178.697182][   T67]  print_address_description.constprop.0+0x2c/0x3b0
[  178.697386][   T67]  ? cleanup_net+0x932/0xa40
[  178.697575][   T67]  print_report+0xb4/0x270
[  178.697727][   T67]  ? kasan_addr_to_slab+0x25/0x80
[  178.697930][   T67]  kasan_report+0xbd/0xf0
[  178.698046][   T67]  ? cleanup_net+0x932/0xa40
[  178.698212][   T67]  cleanup_net+0x932/0xa40
[  178.698402][   T67]  ? __pfx_lock_acquire.part.0+0x10/0x10
[  178.698569][   T67]  ? __pfx_cleanup_net+0x10/0x10
[  178.698724][   T67]  ? trace_lock_acquire+0x148/0x1f0
[  178.698914][   T67]  ? lock_acquire+0x32/0xc0
[  178.699056][   T67]  ? process_one_work+0xe0b/0x16d0
[  178.699207][   T67]  process_one_work+0xe55/0x16d0
[  178.699398][   T67]  ? __pfx___lock_release+0x10/0x10
[  178.699586][   T67]  ? __pfx_process_one_work+0x10/0x10
[  178.699748][   T67]  ? assign_work+0x16c/0x240
[  178.699887][   T67]  worker_thread+0x58c/0xce0
[  178.700025][   T67]  ? lockdep_hardirqs_on_prepare+0x275/0x410
[  178.700198][   T67]  ? __pfx_worker_thread+0x10/0x10
[  178.700349][   T67]  ? __pfx_worker_thread+0x10/0x10
[  178.700541][   T67]  kthread+0x28a/0x350
[  178.700657][   T67]  ? __pfx_kthread+0x10/0x10
[  178.700847][   T67]  ret_from_fork+0x31/0x70
[  178.700989][   T67]  ? __pfx_kthread+0x10/0x10
[  178.701127][   T67]  ret_from_fork_asm+0x1a/0x30
[  178.701271][   T67]  </TASK>
[  178.701378][   T67] 
[  178.701453][   T67] Allocated by task 252:
[  178.701569][   T67]  kasan_save_stack+0x24/0x50
[  178.701713][   T67]  kasan_save_track+0x14/0x30
[  178.701868][   T67]  __kasan_slab_alloc+0x59/0x70
[  178.702056][   T67]  kmem_cache_alloc_noprof+0x10b/0x350
[  178.702209][   T67]  copy_net_ns+0xc6/0x340
[  178.702351][   T67]  create_new_namespaces+0x35f/0x920
[  178.702522][   T67]  unshare_nsproxy_namespaces+0x8d/0x130
[  178.702666][   T67]  ksys_unshare+0x2a9/0x660
[  178.702863][   T67]  __x64_sys_unshare+0x31/0x40
[  178.703008][   T67]  do_syscall_64+0xc1/0x1d0
[  178.703172][   T67]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  178.703384][   T67] 
[  178.703468][   T67] Freed by task 67:
[  178.703620][   T67]  kasan_save_stack+0x24/0x50
[  178.703767][   T67]  kasan_save_track+0x14/0x30
[  178.703934][   T67]  kasan_save_free_info+0x3b/0x60
[  178.704076][   T67]  __kasan_slab_free+0x38/0x50
[  178.704221][   T67]  kmem_cache_free+0xf8/0x330
[  178.704374][   T67]  cleanup_net+0x5a8/0xa40
[  178.704527][   T67]  process_one_work+0xe55/0x16d0
[  178.704668][   T67]  worker_thread+0x58c/0xce0
[  178.704855][   T67]  kthread+0x28a/0x350
[  178.704962][   T67]  ret_from_fork+0x31/0x70
[  178.705103][   T67]  ret_from_fork_asm+0x1a/0x30
[  178.705288][   T67] 
[  178.705369][   T67] Last potentially related work creation:
[  178.705534][   T67]  kasan_save_stack+0x24/0x50
[  178.705678][   T67]  __kasan_record_aux_stack+0x8e/0xa0
[  178.705819][   T67]  insert_work+0x34/0x230
[  178.705925][   T67]  __queue_work+0x5fd/0xa40
[  178.706064][   T67]  queue_delayed_work_on+0x8c/0xa0
[  178.706202][   T67]  __inet_insert_ifa+0x751/0xb10
[  178.706346][   T67]  inetdev_event+0xb18/0xcf0
[  178.706489][   T67]  notifier_call_chain+0xcd/0x150
[  178.706652][   T67]  __dev_notify_flags+0xe6/0x250
[  178.706794][   T67]  dev_change_flags+0xec/0x160
[  178.706946][   T67]  do_setlink.constprop.0+0x79d/0x2300
[  178.707090][   T67]  rtnl_newlink+0x6de/0xa80
[  178.707229][   T67]  rtnetlink_rcv_msg+0x712/0xc10
[  178.707372][   T67]  netlink_rcv_skb+0x130/0x360
[  178.707517][   T67]  netlink_unicast+0x44b/0x710
[  178.707653][   T67]  netlink_sendmsg+0x723/0xbe0
[  178.707815][   T67]  ____sys_sendmsg+0x7ac/0xa10
[  178.707956][   T67]  ___sys_sendmsg+0xee/0x170
[  178.708122][   T67]  __sys_sendmsg+0x109/0x1a0
[  178.708260][   T67]  do_syscall_64+0xc1/0x1d0
[  178.708407][   T67]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  178.708579][   T67] 
[  178.708649][   T67] The buggy address belongs to the object at ffff8880095f0040
[  178.708649][   T67]  which belongs to the cache net_namespace of size 6592
[  178.709025][   T67] The buggy address is located 184 bytes inside of
[  178.709025][   T67]  freed 6592-byte region [ffff8880095f0040, ffff8880095f1a00)
[  178.709360][   T67] 
[  178.709433][   T67] The buggy address belongs to the physical page:
[  178.709606][   T67] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x95f0
[  178.709860][   T67] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  178.710079][   T67] flags: 0x80000000000040(head|node=0|zone=1)
[  178.710255][   T67] page_type: f5(slab)
[  178.710364][   T67] raw: 0080000000000040 ffff888001963240 ffff8880019680a8 ffff8880019680a8
[  178.710609][   T67] raw: 0000000000000000 0000000000040004 00000001f5000000 0000000000000000
[  178.710855][   T67] head: 0080000000000040 ffff888001963240 ffff8880019680a8 ffff8880019680a8
[  178.711108][   T67] head: 0000000000000000 0000000000040004 00000001f5000000 0000000000000000
[  178.711352][   T67] head: 0080000000000003 ffffea0000257c01 ffffffffffffffff 0000000000000000
[  178.711595][   T67] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[  178.711838][   T67] page dumped because: kasan: bad access detected
[  178.712008][   T67] 
[  178.712077][   T67] Memory state around the buggy address:
[  178.712219][   T67]  ffff8880095eff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  178.712422][   T67]  ffff8880095f0000: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[  178.712619][   T67] >ffff8880095f0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  178.712825][   T67]                                                                 ^
[  178.713025][   T67]  ffff8880095f0100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  178.713231][   T67]  ffff8880095f0180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  178.713428][   T67] ==================================================================
[  178.713710][   T67] Disabling lock debugging due to kernel taint