Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. 2025/07/03 18:32:36 ignoring optional flag "sandboxArg"="0" 2025/07/03 18:32:37 parsed 1 programs [ 47.828572][ T29] audit: type=1400 audit(1751567557.535:61): avc: denied { node_bind } for pid=2952 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 50.438008][ T29] audit: type=1400 audit(1751567560.145:62): avc: denied { mounton } for pid=2960 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 50.444460][ T2960] cgroup: Unknown subsys name 'net' [ 50.460844][ T29] audit: type=1400 audit(1751567560.145:63): avc: denied { mount } for pid=2960 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.488351][ T29] audit: type=1400 audit(1751567560.185:64): avc: denied { unmount } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 50.665130][ T2960] cgroup: Unknown subsys name 'cpuset' [ 50.674318][ T2960] cgroup: Unknown subsys name 'rlimit' [ 50.853487][ T29] audit: type=1400 audit(1751567560.565:65): avc: denied { setattr } for pid=2960 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.876971][ T29] audit: type=1400 audit(1751567560.565:66): avc: denied { create } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.897582][ T29] audit: type=1400 audit(1751567560.565:67): avc: denied { write } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.918051][ T29] audit: type=1400 audit(1751567560.565:68): avc: denied { read } for pid=2960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.938455][ T29] audit: type=1400 audit(1751567560.565:69): avc: denied { module_request } for pid=2960 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 50.961159][ T29] audit: type=1400 audit(1751567560.615:70): avc: denied { sys_module } for pid=2960 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 51.037420][ T2965] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 51.075906][ T2960] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 52.740113][ T2967] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 52.929878][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 52.929902][ T29] audit: type=1400 audit(1751567562.635:89): avc: denied { read write } for pid=2967 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 52.960307][ T29] audit: type=1400 audit(1751567562.635:90): avc: denied { open } for pid=2967 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 52.984357][ T29] audit: type=1400 audit(1751567562.635:91): avc: denied { ioctl } for pid=2967 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 58.326655][ T29] audit: type=1400 audit(1751567568.035:92): avc: denied { create } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.347314][ T29] audit: type=1400 audit(1751567568.035:93): avc: denied { write } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.378538][ T29] audit: type=1400 audit(1751567568.085:94): avc: denied { read } for pid=3013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.607691][ T29] audit: type=1400 audit(1751567579.315:95): avc: denied { create } for pid=3471 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 70.328094][ T29] audit: type=1401 audit(1751567580.035:96): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 70.557137][ T29] audit: type=1400 audit(1751567580.265:97): avc: denied { create } for pid=3492 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 70.582097][ T29] audit: type=1400 audit(1751567580.285:98): avc: denied { sys_admin } for pid=3492 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 70.629165][ T29] audit: type=1400 audit(1751567580.335:99): avc: denied { sys_chroot } for pid=3493 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 2025/07/03 18:33:02 executed programs: 0 [ 72.517961][ T29] audit: type=1400 audit(1751567582.225:100): avc: denied { write } for pid=2952 comm="syz-execprog" path="pipe:[572]" dev="pipefs" ino=572 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2025/07/03 18:33:17 executed programs: 2 [ 87.345022][ T29] audit: type=1400 audit(1751567597.045:101): avc: denied { read write } for pid=3988 comm="syz.3.16" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.368754][ T29] audit: type=1400 audit(1751567597.045:102): avc: denied { open } for pid=3988 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.392276][ T29] audit: type=1400 audit(1751567597.045:103): avc: denied { ioctl } for pid=3988 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.652528][ T10] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 87.802319][ T10] usb 4-1: Using ep0 maxpacket: 8 [ 87.809791][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2 [ 87.818144][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2 [ 87.826399][ T10] usb 4-1: config 162 has 2 interfaces, different from the descriptor's value: 3 [ 87.835593][ T10] usb 4-1: config 162 has no interface number 0 [ 87.841964][ T10] usb 4-1: config 162 has no interface number 1 [ 87.848331][ T10] usb 4-1: config 162 interface 3 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 87.861453][ T10] usb 4-1: config 162 interface 2 altsetting 1 has a duplicate endpoint with address 0x9, skipping [ 87.872253][ T10] usb 4-1: config 162 interface 2 altsetting 1 has an endpoint descriptor with address 0xA6, changing to 0x86 [ 87.884109][ T10] usb 4-1: config 162 interface 2 altsetting 1 endpoint 0x86 has invalid maxpacket 23105, setting to 1024 [ 87.895518][ T10] usb 4-1: config 162 interface 2 altsetting 1 bulk endpoint 0x86 has invalid maxpacket 1024 [ 87.905774][ T10] usb 4-1: config 162 interface 2 altsetting 1 has 5 endpoint descriptors, different from the interface descriptor's value: 4 [ 87.918895][ T10] usb 4-1: config 162 interface 3 has no altsetting 0 [ 87.925777][ T10] usb 4-1: config 162 interface 3 has no altsetting 1 [ 87.932628][ T10] usb 4-1: config 162 interface 2 has no altsetting 0 [ 87.941839][ T10] usb 4-1: New USB device found, idVendor=0e8d, idProduct=763f, bcdDevice=9b.23 [ 87.950993][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.959051][ T10] usb 4-1: Product: syz [ 87.963275][ T10] usb 4-1: Manufacturer: syz [ 87.967906][ T10] usb 4-1: SerialNumber: syz [ 88.206573][ T10] usb 4-1: USB disconnect, device number 2 [ 88.207217][ T3993] Bluetooth: hci0: sending frame failed (-19) [ 88.219062][ T3992] Bluetooth: hci0: Opcode 0x0c03 failed: -19 [ 88.229603][ T10] ================================================================== [ 88.237741][ T10] BUG: KASAN: slab-use-after-free in btusb_disconnect+0x4dc/0x580 [ 88.245627][ T10] Read of size 4 at addr ffff888107ebf7c0 by task kworker/0:1/10 [ 88.253358][ T10] [ 88.255711][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary) [ 88.255743][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 88.255759][ T10] Workqueue: usb_hub_wq hub_event [ 88.255787][ T10] Call Trace: [ 88.255795][ T10] [ 88.255805][ T10] dump_stack_lvl+0x116/0x1f0 [ 88.255846][ T10] print_report+0xcd/0x680 [ 88.255872][ T10] ? __virt_addr_valid+0x81/0x610 [ 88.255901][ T10] ? __phys_addr+0xe8/0x180 [ 88.255931][ T10] ? btusb_disconnect+0x4dc/0x580 [ 88.255954][ T10] kasan_report+0xe0/0x110 [ 88.255981][ T10] ? btusb_disconnect+0x4dc/0x580 [ 88.256008][ T10] btusb_disconnect+0x4dc/0x580 [ 88.256033][ T10] usb_unbind_interface+0x1da/0x9a0 [ 88.256061][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 88.256096][ T10] ? __pfx_usb_unbind_interface+0x10/0x10 [ 88.256122][ T10] device_remove+0x122/0x170 [ 88.256147][ T10] device_release_driver_internal+0x44b/0x620 [ 88.256180][ T10] bus_remove_device+0x22f/0x420 [ 88.256205][ T10] device_del+0x396/0x9f0 [ 88.256231][ T10] ? __pfx_device_del+0x10/0x10 [ 88.256256][ T10] ? kobject_put+0x210/0x5a0 [ 88.256281][ T10] usb_disable_device+0x355/0x7d0 [ 88.256322][ T10] usb_disconnect+0x2e1/0x920 [ 88.256361][ T10] hub_event+0x1aa0/0x5030 [ 88.256392][ T10] ? __lock_acquire+0xb8a/0x1c90 [ 88.256415][ T10] ? __pfx_hub_event+0x10/0x10 [ 88.256435][ T10] ? assoc_array_gc+0xe00/0x15b0 [ 88.256462][ T10] ? rcu_is_watching+0x12/0xc0 [ 88.256495][ T10] process_one_work+0x9cc/0x1b70 [ 88.256529][ T10] ? __pfx_hub_event+0x10/0x10 [ 88.256550][ T10] ? __pfx_process_one_work+0x10/0x10 [ 88.256583][ T10] ? assign_work+0x1a0/0x250 [ 88.256626][ T10] worker_thread+0x6c8/0xf10 [ 88.256670][ T10] ? __kthread_parkme+0x19e/0x250 [ 88.256716][ T10] ? __pfx_worker_thread+0x10/0x10 [ 88.256744][ T10] kthread+0x3c5/0x780 [ 88.256768][ T10] ? __pfx_kthread+0x10/0x10 [ 88.256792][ T10] ? rcu_is_watching+0x12/0xc0 [ 88.256822][ T10] ? __pfx_kthread+0x10/0x10 [ 88.256846][ T10] ret_from_fork+0x5b3/0x6c0 [ 88.256881][ T10] ? __pfx_kthread+0x10/0x10 [ 88.256905][ T10] ret_from_fork_asm+0x1a/0x30 [ 88.256940][ T10] [ 88.256947][ T10] [ 88.479279][ T10] Allocated by task 10: [ 88.483450][ T10] kasan_save_stack+0x33/0x60 [ 88.488157][ T10] kasan_save_track+0x14/0x30 [ 88.492851][ T10] __kasan_kmalloc+0x8f/0xa0 [ 88.497457][ T10] __kmalloc_node_track_caller_noprof+0x212/0x4c0 [ 88.503901][ T10] devm_kmalloc+0xa5/0x260 [ 88.508339][ T10] btusb_probe+0x23f/0x4480 [ 88.512873][ T10] usb_probe_interface+0x300/0x9c0 [ 88.518153][ T10] really_probe+0x241/0xa90 [ 88.522684][ T10] __driver_probe_device+0x1de/0x440 [ 88.527997][ T10] driver_probe_device+0x4c/0x1b0 [ 88.533046][ T10] __device_attach_driver+0x1df/0x310 [ 88.538443][ T10] bus_for_each_drv+0x159/0x1e0 [ 88.543324][ T10] __device_attach+0x1e4/0x4b0 [ 88.548111][ T10] bus_probe_device+0x17f/0x1c0 [ 88.552975][ T10] device_add+0x1148/0x1a70 [ 88.557518][ T10] usb_set_configuration+0x1187/0x1e20 [ 88.563007][ T10] usb_generic_driver_probe+0xb1/0x110 [ 88.568497][ T10] usb_probe_device+0xec/0x3e0 [ 88.573329][ T10] really_probe+0x241/0xa90 [ 88.577859][ T10] __driver_probe_device+0x1de/0x440 [ 88.583167][ T10] driver_probe_device+0x4c/0x1b0 [ 88.588221][ T10] __device_attach_driver+0x1df/0x310 [ 88.593614][ T10] bus_for_each_drv+0x159/0x1e0 [ 88.598511][ T10] __device_attach+0x1e4/0x4b0 [ 88.603292][ T10] bus_probe_device+0x17f/0x1c0 [ 88.608153][ T10] device_add+0x1148/0x1a70 [ 88.612675][ T10] usb_new_device+0xd07/0x1a20 [ 88.617456][ T10] hub_event+0x2f85/0x5030 [ 88.621882][ T10] process_one_work+0x9cc/0x1b70 [ 88.626838][ T10] worker_thread+0x6c8/0xf10 [ 88.631445][ T10] kthread+0x3c5/0x780 [ 88.635537][ T10] ret_from_fork+0x5b3/0x6c0 [ 88.640160][ T10] ret_from_fork_asm+0x1a/0x30 [ 88.644974][ T10] [ 88.647304][ T10] Freed by task 10: [ 88.651115][ T10] kasan_save_stack+0x33/0x60 [ 88.655816][ T10] kasan_save_track+0x14/0x30 [ 88.660507][ T10] kasan_save_free_info+0x3b/0x60 [ 88.665562][ T10] __kasan_slab_free+0x37/0x50 [ 88.670349][ T10] kfree+0x283/0x470 [ 88.674271][ T10] release_nodes+0x11e/0x240 [ 88.678899][ T10] devres_release_all+0x112/0x180 [ 88.683958][ T10] device_unbind_cleanup+0x19/0x1b0 [ 88.689189][ T10] device_release_driver_internal+0x4c3/0x620 [ 88.695294][ T10] usb_driver_release_interface+0x109/0x190 [ 88.701217][ T10] btusb_disconnect+0x448/0x580 [ 88.706210][ T10] usb_unbind_interface+0x1da/0x9a0 [ 88.711457][ T10] device_remove+0x122/0x170 [ 88.716085][ T10] device_release_driver_internal+0x44b/0x620 [ 88.722197][ T10] bus_remove_device+0x22f/0x420 [ 88.727173][ T10] device_del+0x396/0x9f0 [ 88.731535][ T10] usb_disable_device+0x355/0x7d0 [ 88.736608][ T10] usb_disconnect+0x2e1/0x920 [ 88.741330][ T10] hub_event+0x1aa0/0x5030 [ 88.745775][ T10] process_one_work+0x9cc/0x1b70 [ 88.750743][ T10] worker_thread+0x6c8/0xf10 [ 88.755372][ T10] kthread+0x3c5/0x780 [ 88.759473][ T10] ret_from_fork+0x5b3/0x6c0 [ 88.764106][ T10] ret_from_fork_asm+0x1a/0x30 [ 88.768905][ T10] [ 88.771252][ T10] The buggy address belongs to the object at ffff888107ebf000 [ 88.771252][ T10] which belongs to the cache kmalloc-2k of size 2048 [ 88.785343][ T10] The buggy address is located 1984 bytes inside of [ 88.785343][ T10] freed 2048-byte region [ffff888107ebf000, ffff888107ebf800) [ 88.799369][ T10] [ 88.801718][ T10] The buggy address belongs to the physical page: [ 88.808185][ T10] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107eb8 [ 88.817072][ T10] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 88.825619][ T10] flags: 0x200000000000040(head|node=0|zone=2) [ 88.831869][ T10] page_type: f5(slab) [ 88.835972][ T10] raw: 0200000000000040 ffff888100042000 ffffea00041ba600 dead000000000002 [ 88.844590][ T10] raw: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000 [ 88.853203][ T10] head: 0200000000000040 ffff888100042000 ffffea00041ba600 dead000000000002 [ 88.861900][ T10] head: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000 [ 88.870607][ T10] head: 0200000000000003 ffffea00041fae01 00000000ffffffff 00000000ffffffff [ 88.879303][ T10] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008 [ 88.887994][ T10] page dumped because: kasan: bad access detected [ 88.894431][ T10] page_owner tracks the page as allocated [ 88.900165][ T10] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 3804462285, free_ts 0 [ 88.919923][ T10] post_alloc_hook+0x1c0/0x230 [ 88.924725][ T10] get_page_from_freelist+0xf98/0x2ce0 [ 88.930222][ T10] __alloc_frozen_pages_noprof+0x259/0x21e0 [ 88.936149][ T10] alloc_pages_mpol+0xe4/0x410 [ 88.940946][ T10] new_slab+0x23b/0x330 [ 88.945136][ T10] ___slab_alloc+0xda5/0x1940 [ 88.949844][ T10] __slab_alloc.constprop.0+0x56/0xb0 [ 88.955251][ T10] __kmalloc_cache_noprof+0x209/0x3c0 [ 88.960657][ T10] netdev_create_hash+0x3c/0xc0 [ 88.965551][ T10] netdev_init+0x70/0x230 [ 88.969914][ T10] ops_init+0x1df/0x5f0 [ 88.974102][ T10] register_pernet_operations+0x39c/0x700 [ 88.979886][ T10] register_pernet_subsys+0x28/0x40 [ 88.985115][ T10] net_dev_init+0x13a/0xcb0 [ 88.989657][ T10] do_one_initcall+0x120/0x6e0 [ 88.994458][ T10] kernel_init_freeable+0x5c2/0x900 [ 88.999695][ T10] page_owner free stack trace missing [ 89.005076][ T10] [ 89.007414][ T10] Memory state around the buggy address: [ 89.013062][ T10] ffff888107ebf680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.021145][ T10] ffff888107ebf700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.029232][ T10] >ffff888107ebf780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 89.037315][ T10] ^ [ 89.043486][ T10] ffff888107ebf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.051570][ T10] ffff888107ebf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 89.059656][ T10] ================================================================== [ 89.067879][ T10] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 89.075139][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary) [ 89.087524][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.097634][ T10] Workqueue: usb_hub_wq hub_event [ 89.102729][ T10] Call Trace: [ 89.106060][ T10] [ 89.109034][ T10] dump_stack_lvl+0x3d/0x1f0 [ 89.113721][ T10] panic+0x71c/0x800 [ 89.117678][ T10] ? __pfx_panic+0x10/0x10 [ 89.122140][ T10] ? mark_held_locks+0x49/0x80 [ 89.126945][ T10] ? btusb_disconnect+0x4dc/0x580 [ 89.132009][ T10] ? check_panic_on_warn+0x1f/0xb0 [ 89.137165][ T10] ? btusb_disconnect+0x4dc/0x580 [ 89.142231][ T10] check_panic_on_warn+0xab/0xb0 [ 89.147205][ T10] end_report+0x107/0x170 [ 89.151567][ T10] kasan_report+0xee/0x110 [ 89.156023][ T10] ? btusb_disconnect+0x4dc/0x580 [ 89.161081][ T10] btusb_disconnect+0x4dc/0x580 [ 89.165966][ T10] usb_unbind_interface+0x1da/0x9a0 [ 89.171768][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 89.177463][ T10] ? __pfx_usb_unbind_interface+0x10/0x10 [ 89.183227][ T10] device_remove+0x122/0x170 [ 89.187851][ T10] device_release_driver_internal+0x44b/0x620 [ 89.193963][ T10] bus_remove_device+0x22f/0x420 [ 89.198941][ T10] device_del+0x396/0x9f0 [ 89.203313][ T10] ? __pfx_device_del+0x10/0x10 [ 89.208201][ T10] ? kobject_put+0x210/0x5a0 [ 89.212825][ T10] usb_disable_device+0x355/0x7d0 [ 89.217902][ T10] usb_disconnect+0x2e1/0x920 [ 89.222632][ T10] hub_event+0x1aa0/0x5030 [ 89.227092][ T10] ? __lock_acquire+0xb8a/0x1c90 [ 89.232061][ T10] ? __pfx_hub_event+0x10/0x10 [ 89.236854][ T10] ? assoc_array_gc+0xe00/0x15b0 [ 89.241836][ T10] ? rcu_is_watching+0x12/0xc0 [ 89.246641][ T10] process_one_work+0x9cc/0x1b70 [ 89.251624][ T10] ? __pfx_hub_event+0x10/0x10 [ 89.256419][ T10] ? __pfx_process_one_work+0x10/0x10 [ 89.261833][ T10] ? assign_work+0x1a0/0x250 [ 89.266462][ T10] worker_thread+0x6c8/0xf10 [ 89.271101][ T10] ? __kthread_parkme+0x19e/0x250 [ 89.276174][ T10] ? __pfx_worker_thread+0x10/0x10 [ 89.281335][ T10] kthread+0x3c5/0x780 [ 89.285473][ T10] ? __pfx_kthread+0x10/0x10 [ 89.290121][ T10] ? rcu_is_watching+0x12/0xc0 [ 89.294944][ T10] ? __pfx_kthread+0x10/0x10 [ 89.299573][ T10] ret_from_fork+0x5b3/0x6c0 [ 89.304240][ T10] ? __pfx_kthread+0x10/0x10 [ 89.308897][ T10] ret_from_fork_asm+0x1a/0x30 [ 89.313720][ T10] [ 89.316990][ T10] Kernel Offset: disabled [ 89.321417][ T10] Rebooting in 86400 seconds..