Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts.
2025/07/03 18:32:36 ignoring optional flag "sandboxArg"="0"
2025/07/03 18:32:37 parsed 1 programs
[ 47.828572][ T29] audit: type=1400 audit(1751567557.535:61): avc: denied { node_bind } for pid=2952 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 50.438008][ T29] audit: type=1400 audit(1751567560.145:62): avc: denied { mounton } for pid=2960 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 50.444460][ T2960] cgroup: Unknown subsys name 'net'
[ 50.460844][ T29] audit: type=1400 audit(1751567560.145:63): avc: denied { mount } for pid=2960 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.488351][ T29] audit: type=1400 audit(1751567560.185:64): avc: denied { unmount } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.665130][ T2960] cgroup: Unknown subsys name 'cpuset'
[ 50.674318][ T2960] cgroup: Unknown subsys name 'rlimit'
[ 50.853487][ T29] audit: type=1400 audit(1751567560.565:65): avc: denied { setattr } for pid=2960 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 50.876971][ T29] audit: type=1400 audit(1751567560.565:66): avc: denied { create } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 50.897582][ T29] audit: type=1400 audit(1751567560.565:67): avc: denied { write } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 50.918051][ T29] audit: type=1400 audit(1751567560.565:68): avc: denied { read } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 50.938455][ T29] audit: type=1400 audit(1751567560.565:69): avc: denied { module_request } for pid=2960 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 50.961159][ T29] audit: type=1400 audit(1751567560.615:70): avc: denied { sys_module } for pid=2960 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 51.037420][ T2965] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 51.075906][ T2960] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 52.740113][ T2967] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 52.929878][ T29] kauditd_printk_skb: 18 callbacks suppressed
[ 52.929902][ T29] audit: type=1400 audit(1751567562.635:89): avc: denied { read write } for pid=2967 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 52.960307][ T29] audit: type=1400 audit(1751567562.635:90): avc: denied { open } for pid=2967 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 52.984357][ T29] audit: type=1400 audit(1751567562.635:91): avc: denied { ioctl } for pid=2967 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 58.326655][ T29] audit: type=1400 audit(1751567568.035:92): avc: denied { create } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 58.347314][ T29] audit: type=1400 audit(1751567568.035:93): avc: denied { write } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 58.378538][ T29] audit: type=1400 audit(1751567568.085:94): avc: denied { read } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 69.607691][ T29] audit: type=1400 audit(1751567579.315:95): avc: denied { create } for pid=3471 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 70.328094][ T29] audit: type=1401 audit(1751567580.035:96): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 70.557137][ T29] audit: type=1400 audit(1751567580.265:97): avc: denied { create } for pid=3492 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 70.582097][ T29] audit: type=1400 audit(1751567580.285:98): avc: denied { sys_admin } for pid=3492 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 70.629165][ T29] audit: type=1400 audit(1751567580.335:99): avc: denied { sys_chroot } for pid=3493 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
2025/07/03 18:33:02 executed programs: 0
[ 72.517961][ T29] audit: type=1400 audit(1751567582.225:100): avc: denied { write } for pid=2952 comm="syz-execprog" path="pipe:[572]" dev="pipefs" ino=572 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
2025/07/03 18:33:17 executed programs: 2
[ 87.345022][ T29] audit: type=1400 audit(1751567597.045:101): avc: denied { read write } for pid=3988 comm="syz.3.16" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.368754][ T29] audit: type=1400 audit(1751567597.045:102): avc: denied { open } for pid=3988 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.392276][ T29] audit: type=1400 audit(1751567597.045:103): avc: denied { ioctl } for pid=3988 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.652528][ T10] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 87.802319][ T10] usb 4-1: Using ep0 maxpacket: 8
[ 87.809791][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.818144][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.826399][ T10] usb 4-1: config 162 has 2 interfaces, different from the descriptor's value: 3
[ 87.835593][ T10] usb 4-1: config 162 has no interface number 0
[ 87.841964][ T10] usb 4-1: config 162 has no interface number 1
[ 87.848331][ T10] usb 4-1: config 162 interface 3 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 3
[ 87.861453][ T10] usb 4-1: config 162 interface 2 altsetting 1 has a duplicate endpoint with address 0x9, skipping
[ 87.872253][ T10] usb 4-1: config 162 interface 2 altsetting 1 has an endpoint descriptor with address 0xA6, changing to 0x86
[ 87.884109][ T10] usb 4-1: config 162 interface 2 altsetting 1 endpoint 0x86 has invalid maxpacket 23105, setting to 1024
[ 87.895518][ T10] usb 4-1: config 162 interface 2 altsetting 1 bulk endpoint 0x86 has invalid maxpacket 1024
[ 87.905774][ T10] usb 4-1: config 162 interface 2 altsetting 1 has 5 endpoint descriptors, different from the interface descriptor's value: 4
[ 87.918895][ T10] usb 4-1: config 162 interface 3 has no altsetting 0
[ 87.925777][ T10] usb 4-1: config 162 interface 3 has no altsetting 1
[ 87.932628][ T10] usb 4-1: config 162 interface 2 has no altsetting 0
[ 87.941839][ T10] usb 4-1: New USB device found, idVendor=0e8d, idProduct=763f, bcdDevice=9b.23
[ 87.950993][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 87.959051][ T10] usb 4-1: Product: syz
[ 87.963275][ T10] usb 4-1: Manufacturer: syz
[ 87.967906][ T10] usb 4-1: SerialNumber: syz
[ 88.206573][ T10] usb 4-1: USB disconnect, device number 2
[ 88.207217][ T3993] Bluetooth: hci0: sending frame failed (-19)
[ 88.219062][ T3992] Bluetooth: hci0: Opcode 0x0c03 failed: -19
[ 88.229603][ T10] ==================================================================
[ 88.237741][ T10] BUG: KASAN: slab-use-after-free in btusb_disconnect+0x4dc/0x580
[ 88.245627][ T10] Read of size 4 at addr ffff888107ebf7c0 by task kworker/0:1/10
[ 88.253358][ T10]
[ 88.255711][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 88.255743][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 88.255759][ T10] Workqueue: usb_hub_wq hub_event
[ 88.255787][ T10] Call Trace:
[ 88.255795][ T10]
[ 88.255805][ T10] dump_stack_lvl+0x116/0x1f0
[ 88.255846][ T10] print_report+0xcd/0x680
[ 88.255872][ T10] ? __virt_addr_valid+0x81/0x610
[ 88.255901][ T10] ? __phys_addr+0xe8/0x180
[ 88.255931][ T10] ? btusb_disconnect+0x4dc/0x580
[ 88.255954][ T10] kasan_report+0xe0/0x110
[ 88.255981][ T10] ? btusb_disconnect+0x4dc/0x580
[ 88.256008][ T10] btusb_disconnect+0x4dc/0x580
[ 88.256033][ T10] usb_unbind_interface+0x1da/0x9a0
[ 88.256061][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 88.256096][ T10] ? __pfx_usb_unbind_interface+0x10/0x10
[ 88.256122][ T10] device_remove+0x122/0x170
[ 88.256147][ T10] device_release_driver_internal+0x44b/0x620
[ 88.256180][ T10] bus_remove_device+0x22f/0x420
[ 88.256205][ T10] device_del+0x396/0x9f0
[ 88.256231][ T10] ? __pfx_device_del+0x10/0x10
[ 88.256256][ T10] ? kobject_put+0x210/0x5a0
[ 88.256281][ T10] usb_disable_device+0x355/0x7d0
[ 88.256322][ T10] usb_disconnect+0x2e1/0x920
[ 88.256361][ T10] hub_event+0x1aa0/0x5030
[ 88.256392][ T10] ? __lock_acquire+0xb8a/0x1c90
[ 88.256415][ T10] ? __pfx_hub_event+0x10/0x10
[ 88.256435][ T10] ? assoc_array_gc+0xe00/0x15b0
[ 88.256462][ T10] ? rcu_is_watching+0x12/0xc0
[ 88.256495][ T10] process_one_work+0x9cc/0x1b70
[ 88.256529][ T10] ? __pfx_hub_event+0x10/0x10
[ 88.256550][ T10] ? __pfx_process_one_work+0x10/0x10
[ 88.256583][ T10] ? assign_work+0x1a0/0x250
[ 88.256626][ T10] worker_thread+0x6c8/0xf10
[ 88.256670][ T10] ? __kthread_parkme+0x19e/0x250
[ 88.256716][ T10] ? __pfx_worker_thread+0x10/0x10
[ 88.256744][ T10] kthread+0x3c5/0x780
[ 88.256768][ T10] ? __pfx_kthread+0x10/0x10
[ 88.256792][ T10] ? rcu_is_watching+0x12/0xc0
[ 88.256822][ T10] ? __pfx_kthread+0x10/0x10
[ 88.256846][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.256881][ T10] ? __pfx_kthread+0x10/0x10
[ 88.256905][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.256940][ T10]
[ 88.256947][ T10]
[ 88.479279][ T10] Allocated by task 10:
[ 88.483450][ T10] kasan_save_stack+0x33/0x60
[ 88.488157][ T10] kasan_save_track+0x14/0x30
[ 88.492851][ T10] __kasan_kmalloc+0x8f/0xa0
[ 88.497457][ T10] __kmalloc_node_track_caller_noprof+0x212/0x4c0
[ 88.503901][ T10] devm_kmalloc+0xa5/0x260
[ 88.508339][ T10] btusb_probe+0x23f/0x4480
[ 88.512873][ T10] usb_probe_interface+0x300/0x9c0
[ 88.518153][ T10] really_probe+0x241/0xa90
[ 88.522684][ T10] __driver_probe_device+0x1de/0x440
[ 88.527997][ T10] driver_probe_device+0x4c/0x1b0
[ 88.533046][ T10] __device_attach_driver+0x1df/0x310
[ 88.538443][ T10] bus_for_each_drv+0x159/0x1e0
[ 88.543324][ T10] __device_attach+0x1e4/0x4b0
[ 88.548111][ T10] bus_probe_device+0x17f/0x1c0
[ 88.552975][ T10] device_add+0x1148/0x1a70
[ 88.557518][ T10] usb_set_configuration+0x1187/0x1e20
[ 88.563007][ T10] usb_generic_driver_probe+0xb1/0x110
[ 88.568497][ T10] usb_probe_device+0xec/0x3e0
[ 88.573329][ T10] really_probe+0x241/0xa90
[ 88.577859][ T10] __driver_probe_device+0x1de/0x440
[ 88.583167][ T10] driver_probe_device+0x4c/0x1b0
[ 88.588221][ T10] __device_attach_driver+0x1df/0x310
[ 88.593614][ T10] bus_for_each_drv+0x159/0x1e0
[ 88.598511][ T10] __device_attach+0x1e4/0x4b0
[ 88.603292][ T10] bus_probe_device+0x17f/0x1c0
[ 88.608153][ T10] device_add+0x1148/0x1a70
[ 88.612675][ T10] usb_new_device+0xd07/0x1a20
[ 88.617456][ T10] hub_event+0x2f85/0x5030
[ 88.621882][ T10] process_one_work+0x9cc/0x1b70
[ 88.626838][ T10] worker_thread+0x6c8/0xf10
[ 88.631445][ T10] kthread+0x3c5/0x780
[ 88.635537][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.640160][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.644974][ T10]
[ 88.647304][ T10] Freed by task 10:
[ 88.651115][ T10] kasan_save_stack+0x33/0x60
[ 88.655816][ T10] kasan_save_track+0x14/0x30
[ 88.660507][ T10] kasan_save_free_info+0x3b/0x60
[ 88.665562][ T10] __kasan_slab_free+0x37/0x50
[ 88.670349][ T10] kfree+0x283/0x470
[ 88.674271][ T10] release_nodes+0x11e/0x240
[ 88.678899][ T10] devres_release_all+0x112/0x180
[ 88.683958][ T10] device_unbind_cleanup+0x19/0x1b0
[ 88.689189][ T10] device_release_driver_internal+0x4c3/0x620
[ 88.695294][ T10] usb_driver_release_interface+0x109/0x190
[ 88.701217][ T10] btusb_disconnect+0x448/0x580
[ 88.706210][ T10] usb_unbind_interface+0x1da/0x9a0
[ 88.711457][ T10] device_remove+0x122/0x170
[ 88.716085][ T10] device_release_driver_internal+0x44b/0x620
[ 88.722197][ T10] bus_remove_device+0x22f/0x420
[ 88.727173][ T10] device_del+0x396/0x9f0
[ 88.731535][ T10] usb_disable_device+0x355/0x7d0
[ 88.736608][ T10] usb_disconnect+0x2e1/0x920
[ 88.741330][ T10] hub_event+0x1aa0/0x5030
[ 88.745775][ T10] process_one_work+0x9cc/0x1b70
[ 88.750743][ T10] worker_thread+0x6c8/0xf10
[ 88.755372][ T10] kthread+0x3c5/0x780
[ 88.759473][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.764106][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.768905][ T10]
[ 88.771252][ T10] The buggy address belongs to the object at ffff888107ebf000
[ 88.771252][ T10] which belongs to the cache kmalloc-2k of size 2048
[ 88.785343][ T10] The buggy address is located 1984 bytes inside of
[ 88.785343][ T10] freed 2048-byte region [ffff888107ebf000, ffff888107ebf800)
[ 88.799369][ T10]
[ 88.801718][ T10] The buggy address belongs to the physical page:
[ 88.808185][ T10] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107eb8
[ 88.817072][ T10] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 88.825619][ T10] flags: 0x200000000000040(head|node=0|zone=2)
[ 88.831869][ T10] page_type: f5(slab)
[ 88.835972][ T10] raw: 0200000000000040 ffff888100042000 ffffea00041ba600 dead000000000002
[ 88.844590][ T10] raw: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.853203][ T10] head: 0200000000000040 ffff888100042000 ffffea00041ba600 dead000000000002
[ 88.861900][ T10] head: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.870607][ T10] head: 0200000000000003 ffffea00041fae01 00000000ffffffff 00000000ffffffff
[ 88.879303][ T10] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008
[ 88.887994][ T10] page dumped because: kasan: bad access detected
[ 88.894431][ T10] page_owner tracks the page as allocated
[ 88.900165][ T10] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 3804462285, free_ts 0
[ 88.919923][ T10] post_alloc_hook+0x1c0/0x230
[ 88.924725][ T10] get_page_from_freelist+0xf98/0x2ce0
[ 88.930222][ T10] __alloc_frozen_pages_noprof+0x259/0x21e0
[ 88.936149][ T10] alloc_pages_mpol+0xe4/0x410
[ 88.940946][ T10] new_slab+0x23b/0x330
[ 88.945136][ T10] ___slab_alloc+0xda5/0x1940
[ 88.949844][ T10] __slab_alloc.constprop.0+0x56/0xb0
[ 88.955251][ T10] __kmalloc_cache_noprof+0x209/0x3c0
[ 88.960657][ T10] netdev_create_hash+0x3c/0xc0
[ 88.965551][ T10] netdev_init+0x70/0x230
[ 88.969914][ T10] ops_init+0x1df/0x5f0
[ 88.974102][ T10] register_pernet_operations+0x39c/0x700
[ 88.979886][ T10] register_pernet_subsys+0x28/0x40
[ 88.985115][ T10] net_dev_init+0x13a/0xcb0
[ 88.989657][ T10] do_one_initcall+0x120/0x6e0
[ 88.994458][ T10] kernel_init_freeable+0x5c2/0x900
[ 88.999695][ T10] page_owner free stack trace missing
[ 89.005076][ T10]
[ 89.007414][ T10] Memory state around the buggy address:
[ 89.013062][ T10] ffff888107ebf680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 89.021145][ T10] ffff888107ebf700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 89.029232][ T10] >ffff888107ebf780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 89.037315][ T10] ^
[ 89.043486][ T10] ffff888107ebf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 89.051570][ T10] ffff888107ebf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 89.059656][ T10] ==================================================================
[ 89.067879][ T10] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 89.075139][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 89.087524][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 89.097634][ T10] Workqueue: usb_hub_wq hub_event
[ 89.102729][ T10] Call Trace:
[ 89.106060][ T10]
[ 89.109034][ T10] dump_stack_lvl+0x3d/0x1f0
[ 89.113721][ T10] panic+0x71c/0x800
[ 89.117678][ T10] ? __pfx_panic+0x10/0x10
[ 89.122140][ T10] ? mark_held_locks+0x49/0x80
[ 89.126945][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.132009][ T10] ? check_panic_on_warn+0x1f/0xb0
[ 89.137165][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.142231][ T10] check_panic_on_warn+0xab/0xb0
[ 89.147205][ T10] end_report+0x107/0x170
[ 89.151567][ T10] kasan_report+0xee/0x110
[ 89.156023][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.161081][ T10] btusb_disconnect+0x4dc/0x580
[ 89.165966][ T10] usb_unbind_interface+0x1da/0x9a0
[ 89.171768][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 89.177463][ T10] ? __pfx_usb_unbind_interface+0x10/0x10
[ 89.183227][ T10] device_remove+0x122/0x170
[ 89.187851][ T10] device_release_driver_internal+0x44b/0x620
[ 89.193963][ T10] bus_remove_device+0x22f/0x420
[ 89.198941][ T10] device_del+0x396/0x9f0
[ 89.203313][ T10] ? __pfx_device_del+0x10/0x10
[ 89.208201][ T10] ? kobject_put+0x210/0x5a0
[ 89.212825][ T10] usb_disable_device+0x355/0x7d0
[ 89.217902][ T10] usb_disconnect+0x2e1/0x920
[ 89.222632][ T10] hub_event+0x1aa0/0x5030
[ 89.227092][ T10] ? __lock_acquire+0xb8a/0x1c90
[ 89.232061][ T10] ? __pfx_hub_event+0x10/0x10
[ 89.236854][ T10] ? assoc_array_gc+0xe00/0x15b0
[ 89.241836][ T10] ? rcu_is_watching+0x12/0xc0
[ 89.246641][ T10] process_one_work+0x9cc/0x1b70
[ 89.251624][ T10] ? __pfx_hub_event+0x10/0x10
[ 89.256419][ T10] ? __pfx_process_one_work+0x10/0x10
[ 89.261833][ T10] ? assign_work+0x1a0/0x250
[ 89.266462][ T10] worker_thread+0x6c8/0xf10
[ 89.271101][ T10] ? __kthread_parkme+0x19e/0x250
[ 89.276174][ T10] ? __pfx_worker_thread+0x10/0x10
[ 89.281335][ T10] kthread+0x3c5/0x780
[ 89.285473][ T10] ? __pfx_kthread+0x10/0x10
[ 89.290121][ T10] ? rcu_is_watching+0x12/0xc0
[ 89.294944][ T10] ? __pfx_kthread+0x10/0x10
[ 89.299573][ T10] ret_from_fork+0x5b3/0x6c0
[ 89.304240][ T10] ? __pfx_kthread+0x10/0x10
[ 89.308897][ T10] ret_from_fork_asm+0x1a/0x30
[ 89.313720][ T10]
[ 89.316990][ T10] Kernel Offset: disabled
[ 89.321417][ T10] Rebooting in 86400 seconds..