[  144.295528][   T68] ==================================================================
[  144.295811][   T68] BUG: KASAN: slab-use-after-free in cleanup_net+0x932/0xa40
[  144.296040][   T68] Read of size 8 at addr ffff888005af9c38 by task kworker/u16:1/68
[  144.296259][   T68] 
[  144.296356][   T68] CPU: 2 UID: 0 PID: 68 Comm: kworker/u16:1 Not tainted 6.12.0-virtme #1
[  144.296591][   T68] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[  144.296752][   T68] Workqueue: netns cleanup_net
[  144.296888][   T68] Call Trace:
[  144.296984][   T68]  <TASK>
[  144.297054][   T68]  dump_stack_lvl+0x82/0xd0
[  144.297190][   T68]  print_address_description.constprop.0+0x2c/0x3b0
[  144.297354][   T68]  ? cleanup_net+0x932/0xa40
[  144.297480][   T68]  print_report+0xb4/0x270
[  144.297610][   T68]  ? kasan_addr_to_slab+0x25/0x80
[  144.297750][   T68]  kasan_report+0xbd/0xf0
[  144.297865][   T68]  ? cleanup_net+0x932/0xa40
[  144.298009][   T68]  cleanup_net+0x932/0xa40
[  144.298145][   T68]  ? __pfx_lock_acquire.part.0+0x10/0x10
[  144.298275][   T68]  ? __pfx_cleanup_net+0x10/0x10
[  144.298400][   T68]  ? trace_lock_acquire+0x148/0x1f0
[  144.298537][   T68]  ? lock_acquire+0x32/0xc0
[  144.298686][   T68]  ? process_one_work+0xe0b/0x16d0
[  144.298833][   T68]  process_one_work+0xe55/0x16d0
[  144.298974][   T68]  ? __pfx___lock_release+0x10/0x10
[  144.299124][   T68]  ? __pfx_process_one_work+0x10/0x10
[  144.299269][   T68]  ? assign_work+0x16c/0x240
[  144.299419][   T68]  worker_thread+0x58c/0xce0
[  144.299545][   T68]  ? lockdep_hardirqs_on_prepare+0x275/0x410
[  144.299726][   T68]  ? __pfx_worker_thread+0x10/0x10
[  144.299855][   T68]  ? __pfx_worker_thread+0x10/0x10
[  144.299981][   T68]  kthread+0x28a/0x350
[  144.300077][   T68]  ? __pfx_kthread+0x10/0x10
[  144.300203][   T68]  ret_from_fork+0x31/0x70
[  144.300330][   T68]  ? __pfx_kthread+0x10/0x10
[  144.300455][   T68]  ret_from_fork_asm+0x1a/0x30
[  144.300586][   T68]  </TASK>
[  144.300682][   T68] 
[  144.300751][   T68] Allocated by task 324:
[  144.300851][   T68]  kasan_save_stack+0x24/0x50
[  144.300983][   T68]  kasan_save_track+0x14/0x30
[  144.301104][   T68]  __kasan_slab_alloc+0x59/0x70
[  144.301228][   T68]  kmem_cache_alloc_noprof+0x10b/0x350
[  144.301355][   T68]  copy_net_ns+0xc6/0x340
[  144.301456][   T68]  create_new_namespaces+0x35f/0x920
[  144.301580][   T68]  unshare_nsproxy_namespaces+0x8d/0x130
[  144.301711][   T68]  ksys_unshare+0x2a9/0x660
[  144.301838][   T68]  __x64_sys_unshare+0x31/0x40
[  144.301962][   T68]  do_syscall_64+0xc1/0x1d0
[  144.302087][   T68]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  144.302250][   T68] 
[  144.302325][   T68] Freed by task 68:
[  144.302424][   T68]  kasan_save_stack+0x24/0x50
[  144.302572][   T68]  kasan_save_track+0x14/0x30
[  144.302719][   T68]  kasan_save_free_info+0x3b/0x60
[  144.302853][   T68]  __kasan_slab_free+0x38/0x50
[  144.302979][   T68]  kmem_cache_free+0xf8/0x330
[  144.303102][   T68]  cleanup_net+0x5a8/0xa40
[  144.303228][   T68]  process_one_work+0xe55/0x16d0
[  144.303356][   T68]  worker_thread+0x58c/0xce0
[  144.303482][   T68]  kthread+0x28a/0x350
[  144.303580][   T68]  ret_from_fork+0x31/0x70
[  144.303720][   T68]  ret_from_fork_asm+0x1a/0x30
[  144.303855][   T68] 
[  144.303924][   T68] The buggy address belongs to the object at ffff888005af9b80
[  144.303924][   T68]  which belongs to the cache net_namespace of size 6592
[  144.304295][   T68] The buggy address is located 184 bytes inside of
[  144.304295][   T68]  freed 6592-byte region [ffff888005af9b80, ffff888005afb540)
[  144.304635][   T68] 
[  144.304711][   T68] The buggy address belongs to the physical page:
[  144.304882][   T68] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888005afd200 pfn:0x5af8
[  144.305154][   T68] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.305372][   T68] flags: 0x80000000000240(workingset|head|node=0|zone=1)
[  144.305535][   T68] page_type: f5(slab)
[  144.305657][   T68] raw: 0080000000000240 ffff888001963240 ffff888001968088 ffff888001968088
[  144.305906][   T68] raw: ffff888005afd200 0000000000040003 00000001f5000000 0000000000000000
[  144.306134][   T68] head: 0080000000000240 ffff888001963240 ffff888001968088 ffff888001968088
[  144.306386][   T68] head: ffff888005afd200 0000000000040003 00000001f5000000 0000000000000000
[  144.306644][   T68] head: 0080000000000003 ffffea000016be01 ffffffffffffffff 0000000000000000
[  144.306863][   T68] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[  144.307114][   T68] page dumped because: kasan: bad access detected
[  144.307273][   T68] 
[  144.307350][   T68] Memory state around the buggy address:
[  144.307500][   T68]  ffff888005af9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.307696][   T68]  ffff888005af9b80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  144.307891][   T68] >ffff888005af9c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  144.308099][   T68]                                         ^
[  144.308252][   T68]  ffff888005af9c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  144.308461][   T68]  ffff888005af9d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  144.308656][   T68] ==================================================================
[  144.308924][   T68] Disabling lock debugging due to kernel taint