Warning: Permanently added '10.128.1.227' (ED25519) to the list of known hosts. 2025/07/27 18:17:48 ignoring optional flag "sandboxArg"="0" 2025/07/27 18:17:49 parsed 1 programs [ 49.556313][ T29] audit: type=1400 audit(1753640269.597:61): avc: denied { node_bind } for pid=2954 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 49.577392][ T29] audit: type=1400 audit(1753640269.597:62): avc: denied { module_request } for pid=2954 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 52.192603][ T29] audit: type=1400 audit(1753640272.237:63): avc: denied { mounton } for pid=2963 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 52.198269][ T2963] cgroup: Unknown subsys name 'net' [ 52.215458][ T29] audit: type=1400 audit(1753640272.237:64): avc: denied { mount } for pid=2963 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.245242][ T29] audit: type=1400 audit(1753640272.287:65): avc: denied { unmount } for pid=2963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 52.445412][ T2963] cgroup: Unknown subsys name 'cpuset' [ 52.454871][ T2963] cgroup: Unknown subsys name 'rlimit' [ 52.633127][ T29] audit: type=1400 audit(1753640272.677:66): avc: denied { setattr } for pid=2963 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.656686][ T29] audit: type=1400 audit(1753640272.677:67): avc: denied { create } for pid=2963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.677294][ T29] audit: type=1400 audit(1753640272.677:68): avc: denied { write } for pid=2963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.697747][ T29] audit: type=1400 audit(1753640272.677:69): avc: denied { read } for pid=2963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 52.718797][ T29] audit: type=1400 audit(1753640272.727:70): avc: denied { sys_module } for pid=2963 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 52.814973][ T2969] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 52.915969][ T2963] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 54.580099][ T2971] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 54.769941][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 54.769979][ T29] audit: type=1400 audit(1753640274.807:89): avc: denied { read write } for pid=2971 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 54.800622][ T29] audit: type=1400 audit(1753640274.807:90): avc: denied { open } for pid=2971 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 54.839673][ T29] audit: type=1400 audit(1753640274.807:91): avc: denied { ioctl } for pid=2971 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 55.128947][ T2989] modprobe (2989) used greatest stack depth: 24056 bytes left [ 55.847413][ T29] audit: type=1400 audit(1753640275.887:92): avc: denied { create } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 55.868322][ T29] audit: type=1400 audit(1753640275.887:93): avc: denied { write } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 55.889232][ T29] audit: type=1400 audit(1753640275.887:94): avc: denied { read } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 56.254633][ T29] audit: type=1400 audit(1753640276.297:95): avc: denied { create } for pid=3015 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 56.275297][ T29] audit: type=1400 audit(1753640276.317:96): avc: denied { sys_admin } for pid=3015 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 56.314742][ T29] audit: type=1400 audit(1753640276.357:97): avc: denied { sys_chroot } for pid=3016 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 71.339333][ T3034] syz-executor (3034) used greatest stack depth: 23400 bytes left [ 71.941326][ T29] audit: type=1400 audit(1753640291.977:98): avc: denied { create } for pid=3503 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 73.423525][ T29] audit: type=1401 audit(1753640293.467:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" 2025/07/27 18:18:13 executed programs: 0 [ 73.809780][ T29] audit: type=1400 audit(1753640293.847:100): avc: denied { write } for pid=2954 comm="syz-execprog" path="pipe:[2329]" dev="pipefs" ino=2329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2025/07/27 18:18:28 executed programs: 2 [ 88.394853][ T29] audit: type=1400 audit(1753640308.437:101): avc: denied { read write } for pid=3991 comm="syz.3.16" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.432900][ T29] audit: type=1400 audit(1753640308.437:102): avc: denied { open } for pid=3991 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.456560][ T29] audit: type=1400 audit(1753640308.437:103): avc: denied { ioctl } for pid=3991 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.631396][ T2804] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 88.781289][ T2804] usb 4-1: Using ep0 maxpacket: 16 [ 88.789127][ T2804] usb 4-1: unable to get BOS descriptor or descriptor too short [ 88.798742][ T2804] usb 4-1: config 4 has an invalid interface number: 22 but max is 0 [ 88.807008][ T2804] usb 4-1: config 4 has no interface number 0 [ 88.813247][ T2804] usb 4-1: config 4 interface 22 has no altsetting 0 [ 88.823002][ T2804] usb 4-1: New USB device found, idVendor=0424, idProduct=cf19, bcdDevice=6a.13 [ 88.832215][ T2804] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 88.840241][ T2804] usb 4-1: Product: syz [ 88.844465][ T2804] usb 4-1: Manufacturer: syz [ 88.849095][ T2804] usb 4-1: SerialNumber: syz [ 89.078596][ T2804] usb 4-1: USB disconnect, device number 2 [ 89.087207][ T2804] ================================================================== [ 89.095323][ T2804] BUG: KASAN: slab-use-after-free in hdm_disconnect+0x227/0x250 [ 89.103004][ T2804] Read of size 8 at addr ffff88811b40d890 by task kworker/1:2/2804 [ 89.110911][ T2804] [ 89.113528][ T2804] CPU: 1 UID: 0 PID: 2804 Comm: kworker/1:2 Not tainted 6.16.0-rc7-syzkaller-g51d4b0a44c82 #0 PREEMPT(voluntary) [ 89.113557][ T2804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.113573][ T2804] Workqueue: usb_hub_wq hub_event [ 89.113600][ T2804] Call Trace: [ 89.113609][ T2804] [ 89.113618][ T2804] dump_stack_lvl+0x116/0x1f0 [ 89.113664][ T2804] print_report+0xcd/0x610 [ 89.113689][ T2804] ? __virt_addr_valid+0x81/0x610 [ 89.113718][ T2804] ? __phys_addr+0xe8/0x180 [ 89.113747][ T2804] ? hdm_disconnect+0x227/0x250 [ 89.113769][ T2804] kasan_report+0xe0/0x110 [ 89.113794][ T2804] ? hdm_disconnect+0x227/0x250 [ 89.113820][ T2804] hdm_disconnect+0x227/0x250 [ 89.113844][ T2804] usb_unbind_interface+0x1dd/0x9a0 [ 89.113873][ T2804] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 89.113906][ T2804] ? __pfx_usb_unbind_interface+0x10/0x10 [ 89.113932][ T2804] device_remove+0x122/0x170 [ 89.113957][ T2804] device_release_driver_internal+0x44b/0x620 [ 89.113990][ T2804] bus_remove_device+0x22f/0x420 [ 89.114014][ T2804] device_del+0x396/0x9f0 [ 89.114041][ T2804] ? __pfx_device_del+0x10/0x10 [ 89.114065][ T2804] ? __pfx___mutex_lock+0x10/0x10 [ 89.114097][ T2804] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 89.114124][ T2804] ? do_raw_spin_lock+0x12c/0x2b0 [ 89.114153][ T2804] usb_disable_device+0x355/0x7d0 [ 89.114175][ T2804] ? lockdep_hardirqs_on+0x7c/0x110 [ 89.114209][ T2804] usb_disconnect+0x2e1/0x9c0 [ 89.114233][ T2804] hub_event+0x1aa2/0x5060 [ 89.114265][ T2804] ? __lock_acquire+0xb8a/0x1c90 [ 89.114287][ T2804] ? __pfx_hub_event+0x10/0x10 [ 89.114308][ T2804] ? free_object_list.isra.0+0x200/0x2a0 [ 89.114336][ T2804] ? rcu_is_watching+0x12/0xc0 [ 89.114368][ T2804] process_one_work+0x9cc/0x1b70 [ 89.114400][ T2804] ? __pfx_hub_event+0x10/0x10 [ 89.114422][ T2804] ? __pfx_process_one_work+0x10/0x10 [ 89.114453][ T2804] ? assign_work+0x1a0/0x250 [ 89.114478][ T2804] worker_thread+0x6c8/0xf10 [ 89.114509][ T2804] ? __kthread_parkme+0x19e/0x250 [ 89.114546][ T2804] ? __pfx_worker_thread+0x10/0x10 [ 89.114573][ T2804] kthread+0x3c2/0x780 [ 89.114596][ T2804] ? __pfx_kthread+0x10/0x10 [ 89.114621][ T2804] ? rcu_is_watching+0x12/0xc0 [ 89.114651][ T2804] ? __pfx_kthread+0x10/0x10 [ 89.114680][ T2804] ret_from_fork+0x5b3/0x6c0 [ 89.114715][ T2804] ? __pfx_kthread+0x10/0x10 [ 89.114739][ T2804] ret_from_fork_asm+0x1a/0x30 [ 89.114775][ T2804] [ 89.114783][ T2804] [ 89.353731][ T2804] Allocated by task 2804: [ 89.358079][ T2804] kasan_save_stack+0x33/0x60 [ 89.362784][ T2804] kasan_save_track+0x14/0x30 [ 89.367483][ T2804] __kasan_kmalloc+0x8f/0xa0 [ 89.372130][ T2804] hdm_probe+0xb3/0x19a0 [ 89.376396][ T2804] usb_probe_interface+0x300/0x9c0 [ 89.381686][ T2804] really_probe+0x241/0xa90 [ 89.386240][ T2804] __driver_probe_device+0x1de/0x440 [ 89.391677][ T2804] driver_probe_device+0x4c/0x1b0 [ 89.396728][ T2804] __device_attach_driver+0x1df/0x310 [ 89.402153][ T2804] bus_for_each_drv+0x159/0x1e0 [ 89.407041][ T2804] __device_attach+0x1e4/0x4b0 [ 89.411832][ T2804] bus_probe_device+0x17f/0x1c0 [ 89.416700][ T2804] device_add+0x1148/0x1a70 [ 89.421230][ T2804] usb_set_configuration+0x1187/0x1e20 [ 89.426704][ T2804] usb_generic_driver_probe+0xb1/0x110 [ 89.432204][ T2804] usb_probe_device+0xec/0x3e0 [ 89.436983][ T2804] really_probe+0x241/0xa90 [ 89.441508][ T2804] __driver_probe_device+0x1de/0x440 [ 89.446814][ T2804] driver_probe_device+0x4c/0x1b0 [ 89.451859][ T2804] __device_attach_driver+0x1df/0x310 [ 89.457253][ T2804] bus_for_each_drv+0x159/0x1e0 [ 89.462308][ T2804] __device_attach+0x1e4/0x4b0 [ 89.467178][ T2804] bus_probe_device+0x17f/0x1c0 [ 89.472065][ T2804] device_add+0x1148/0x1a70 [ 89.476592][ T2804] usb_new_device+0xd07/0x1a20 [ 89.481378][ T2804] hub_event+0x2fce/0x5060 [ 89.485809][ T2804] process_one_work+0x9cc/0x1b70 [ 89.490768][ T2804] worker_thread+0x6c8/0xf10 [ 89.495400][ T2804] kthread+0x3c2/0x780 [ 89.499485][ T2804] ret_from_fork+0x5b3/0x6c0 [ 89.504122][ T2804] ret_from_fork_asm+0x1a/0x30 [ 89.508999][ T2804] [ 89.511334][ T2804] Freed by task 2804: [ 89.515321][ T2804] kasan_save_stack+0x33/0x60 [ 89.520012][ T2804] kasan_save_track+0x14/0x30 [ 89.524711][ T2804] kasan_save_free_info+0x3b/0x60 [ 89.529786][ T2804] __kasan_slab_free+0x37/0x50 [ 89.534566][ T2804] kfree+0x283/0x470 [ 89.538479][ T2804] device_release+0xa4/0x240 [ 89.543100][ T2804] kobject_put+0x1e7/0x5a0 [ 89.547534][ T2804] device_unregister+0x2f/0xc0 [ 89.552315][ T2804] hdm_disconnect+0x10b/0x250 [ 89.557011][ T2804] usb_unbind_interface+0x1dd/0x9a0 [ 89.562244][ T2804] device_remove+0x122/0x170 [ 89.566850][ T2804] device_release_driver_internal+0x44b/0x620 [ 89.572948][ T2804] bus_remove_device+0x22f/0x420 [ 89.577901][ T2804] device_del+0x396/0x9f0 [ 89.582250][ T2804] usb_disable_device+0x355/0x7d0 [ 89.587307][ T2804] usb_disconnect+0x2e1/0x9c0 [ 89.592001][ T2804] hub_event+0x1aa2/0x5060 [ 89.596433][ T2804] process_one_work+0x9cc/0x1b70 [ 89.601391][ T2804] worker_thread+0x6c8/0xf10 [ 89.606024][ T2804] kthread+0x3c2/0x780 [ 89.610149][ T2804] ret_from_fork+0x5b3/0x6c0 [ 89.614769][ T2804] ret_from_fork_asm+0x1a/0x30 [ 89.619577][ T2804] [ 89.621999][ T2804] The buggy address belongs to the object at ffff88811b40c000 [ 89.621999][ T2804] which belongs to the cache kmalloc-8k of size 8192 [ 89.636068][ T2804] The buggy address is located 6288 bytes inside of [ 89.636068][ T2804] freed 8192-byte region [ffff88811b40c000, ffff88811b40e000) [ 89.650169][ T2804] [ 89.652507][ T2804] The buggy address belongs to the physical page: [ 89.658942][ T2804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11b408 [ 89.667985][ T2804] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 89.676584][ T2804] anon flags: 0x200000000000040(head|node=0|zone=2) [ 89.683202][ T2804] page_type: f5(slab) [ 89.687208][ T2804] raw: 0200000000000040 ffff888100042280 ffffea00046cd800 0000000000000005 [ 89.695982][ T2804] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 89.704586][ T2804] head: 0200000000000040 ffff888100042280 ffffea00046cd800 0000000000000005 [ 89.713279][ T2804] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 89.721985][ T2804] head: 0200000000000003 ffffea00046d0201 00000000ffffffff 00000000ffffffff [ 89.730695][ T2804] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008 [ 89.739379][ T2804] page dumped because: kasan: bad access detected [ 89.745808][ T2804] page_owner tracks the page as allocated [ 89.751532][ T2804] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2983, tgid 2983 (syz-executor), ts 54896300565, free_ts 54749207580 [ 89.772917][ T2804] post_alloc_hook+0x1c0/0x230 [ 89.777707][ T2804] get_page_from_freelist+0xf98/0x2ce0 [ 89.783188][ T2804] __alloc_frozen_pages_noprof+0x259/0x21e0 [ 89.789146][ T2804] alloc_pages_mpol+0xe4/0x410 [ 89.793942][ T2804] new_slab+0x23b/0x330 [ 89.798122][ T2804] ___slab_alloc+0xda5/0x1940 [ 89.802817][ T2804] __slab_alloc.constprop.0+0x56/0xb0 [ 89.808208][ T2804] __kmalloc_cache_noprof+0x209/0x3c0 [ 89.813603][ T2804] mr_table_alloc+0x5f/0x2e0 [ 89.818222][ T2804] ipmr_net_init+0x2b1/0x370 [ 89.822848][ T2804] ops_init+0x1e2/0x5f0 [ 89.827102][ T2804] setup_net+0x1ff/0x510 [ 89.831357][ T2804] copy_net_ns+0x2a6/0x5f0 [ 89.835789][ T2804] create_new_namespaces+0x3ea/0xa90 [ 89.841113][ T2804] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 89.846799][ T2804] ksys_unshare+0x45b/0xa40 [ 89.851316][ T2804] page last free pid 2979 tgid 2979 stack trace: [ 89.857660][ T2804] __free_frozen_pages+0x78a/0x1040 [ 89.862907][ T2804] __put_partials+0x16d/0x1c0 [ 89.867618][ T2804] qlist_free_all+0x4d/0x120 [ 89.872240][ T2804] kasan_quarantine_reduce+0x195/0x1e0 [ 89.877716][ T2804] __kasan_slab_alloc+0x4e/0x70 [ 89.882589][ T2804] kmem_cache_alloc_noprof+0x14f/0x3b0 [ 89.888079][ T2804] getname_flags.part.0+0x4c/0x550 [ 89.893209][ T2804] getname_flags+0x93/0xf0 [ 89.897646][ T2804] do_sys_openat2+0xb8/0x1d0 [ 89.902336][ T2804] __x64_sys_openat+0x174/0x210 [ 89.907201][ T2804] do_syscall_64+0xcd/0x4b0 [ 89.911721][ T2804] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.917632][ T2804] [ 89.919961][ T2804] Memory state around the buggy address: [ 89.925599][ T2804] ffff88811b40d780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.933677][ T2804] ffff88811b40d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.941756][ T2804] >ffff88811b40d880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.949833][ T2804] ^ [ 89.954434][ T2804] ffff88811b40d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.962507][ T2804] ffff88811b40d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.970597][ T2804] ================================================================== [ 89.979055][ T2804] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 89.986312][ T2804] CPU: 1 UID: 0 PID: 2804 Comm: kworker/1:2 Not tainted 6.16.0-rc7-syzkaller-g51d4b0a44c82 #0 PREEMPT(voluntary) [ 89.998339][ T2804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 90.008430][ T2804] Workqueue: usb_hub_wq hub_event [ 90.013819][ T2804] Call Trace: [ 90.017111][ T2804] [ 90.020051][ T2804] dump_stack_lvl+0x3d/0x1f0 [ 90.024678][ T2804] panic+0x71c/0x800 [ 90.028592][ T2804] ? __pfx_panic+0x10/0x10 [ 90.033043][ T2804] ? irqentry_exit+0x3b/0x90 [ 90.037667][ T2804] ? lockdep_hardirqs_on+0x7c/0x110 [ 90.042905][ T2804] ? hdm_disconnect+0x227/0x250 [ 90.047868][ T2804] ? check_panic_on_warn+0x1f/0xb0 [ 90.053087][ T2804] ? hdm_disconnect+0x227/0x250 [ 90.058481][ T2804] check_panic_on_warn+0xab/0xb0 [ 90.063445][ T2804] end_report+0x107/0x170 [ 90.067801][ T2804] kasan_report+0xee/0x110 [ 90.072239][ T2804] ? hdm_disconnect+0x227/0x250 [ 90.077113][ T2804] hdm_disconnect+0x227/0x250 [ 90.081809][ T2804] usb_unbind_interface+0x1dd/0x9a0 [ 90.087048][ T2804] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 90.092708][ T2804] ? __pfx_usb_unbind_interface+0x10/0x10 [ 90.098450][ T2804] device_remove+0x122/0x170 [ 90.103063][ T2804] device_release_driver_internal+0x44b/0x620 [ 90.109160][ T2804] bus_remove_device+0x22f/0x420 [ 90.114145][ T2804] device_del+0x396/0x9f0 [ 90.118500][ T2804] ? __pfx_device_del+0x10/0x10 [ 90.123372][ T2804] ? __pfx___mutex_lock+0x10/0x10 [ 90.128424][ T2804] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 90.134167][ T2804] ? do_raw_spin_lock+0x12c/0x2b0 [ 90.139214][ T2804] usb_disable_device+0x355/0x7d0 [ 90.144253][ T2804] ? lockdep_hardirqs_on+0x7c/0x110 [ 90.149480][ T2804] usb_disconnect+0x2e1/0x9c0 [ 90.154261][ T2804] hub_event+0x1aa2/0x5060 [ 90.158710][ T2804] ? __lock_acquire+0xb8a/0x1c90 [ 90.163671][ T2804] ? __pfx_hub_event+0x10/0x10 [ 90.168470][ T2804] ? free_object_list.isra.0+0x200/0x2a0 [ 90.174126][ T2804] ? rcu_is_watching+0x12/0xc0 [ 90.178921][ T2804] process_one_work+0x9cc/0x1b70 [ 90.183888][ T2804] ? __pfx_hub_event+0x10/0x10 [ 90.188673][ T2804] ? __pfx_process_one_work+0x10/0x10 [ 90.194333][ T2804] ? assign_work+0x1a0/0x250 [ 90.199157][ T2804] worker_thread+0x6c8/0xf10 [ 90.203856][ T2804] ? __kthread_parkme+0x19e/0x250 [ 90.208935][ T2804] ? __pfx_worker_thread+0x10/0x10 [ 90.214077][ T2804] kthread+0x3c2/0x780 [ 90.218171][ T2804] ? __pfx_kthread+0x10/0x10 [ 90.222794][ T2804] ? rcu_is_watching+0x12/0xc0 [ 90.227591][ T2804] ? __pfx_kthread+0x10/0x10 [ 90.232214][ T2804] ret_from_fork+0x5b3/0x6c0 [ 90.236838][ T2804] ? __pfx_kthread+0x10/0x10 [ 90.241452][ T2804] ret_from_fork_asm+0x1a/0x30 [ 90.246243][ T2804] [ 90.249439][ T2804] Kernel Offset: disabled [ 90.253878][ T2804] Rebooting in 86400 seconds..