Warning: Permanently added '10.128.1.33' (ED25519) to the list of known hosts.
2025/07/03 17:34:51 ignoring optional flag "sandboxArg"="0"
2025/07/03 17:34:52 parsed 1 programs
[ 48.058449][ T29] audit: type=1400 audit(1751564092.644:61): avc: denied { node_bind } for pid=2953 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 50.635098][ T29] audit: type=1400 audit(1751564095.224:62): avc: denied { mounton } for pid=2961 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 50.641574][ T2961] cgroup: Unknown subsys name 'net'
[ 50.657939][ T29] audit: type=1400 audit(1751564095.224:63): avc: denied { mount } for pid=2961 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.685660][ T29] audit: type=1400 audit(1751564095.264:64): avc: denied { unmount } for pid=2961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.882292][ T2961] cgroup: Unknown subsys name 'cpuset'
[ 50.891593][ T2961] cgroup: Unknown subsys name 'rlimit'
[ 51.039269][ T29] audit: type=1400 audit(1751564095.624:65): avc: denied { setattr } for pid=2961 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 51.062739][ T29] audit: type=1400 audit(1751564095.634:66): avc: denied { create } for pid=2961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.083359][ T29] audit: type=1400 audit(1751564095.634:67): avc: denied { write } for pid=2961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.103835][ T29] audit: type=1400 audit(1751564095.634:68): avc: denied { read } for pid=2961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.124204][ T29] audit: type=1400 audit(1751564095.634:69): avc: denied { module_request } for pid=2961 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 51.146650][ T29] audit: type=1400 audit(1751564095.684:70): avc: denied { sys_module } for pid=2961 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 51.256024][ T2965] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 51.308230][ T2961] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 53.008298][ T2968] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 53.191118][ T29] kauditd_printk_skb: 18 callbacks suppressed
[ 53.191140][ T29] audit: type=1400 audit(1751564097.784:89): avc: denied { read write } for pid=2968 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 53.221842][ T29] audit: type=1400 audit(1751564097.784:90): avc: denied { open } for pid=2968 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 53.245918][ T29] audit: type=1400 audit(1751564097.784:91): avc: denied { ioctl } for pid=2968 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 54.783210][ T29] audit: type=1401 audit(1751564099.374:92): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 54.888462][ T29] audit: type=1400 audit(1751564099.474:93): avc: denied { create } for pid=3011 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 59.167027][ T29] audit: type=1400 audit(1751564103.754:94): avc: denied { create } for pid=3024 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 59.189413][ T29] audit: type=1400 audit(1751564103.754:95): avc: denied { write } for pid=3024 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 59.211993][ T29] audit: type=1400 audit(1751564103.804:96): avc: denied { read } for pid=3024 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 70.285020][ T3024] syz-executor (3024) used greatest stack depth: 22616 bytes left
[ 71.070354][ T29] audit: type=1400 audit(1751564115.664:97): avc: denied { create } for pid=3506 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 71.098752][ T29] audit: type=1400 audit(1751564115.664:98): avc: denied { sys_admin } for pid=3506 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 71.120727][ T29] audit: type=1400 audit(1751564115.714:99): avc: denied { sys_chroot } for pid=3507 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
2025/07/03 17:35:17 executed programs: 0
[ 72.576292][ T29] audit: type=1400 audit(1751564117.164:100): avc: denied { write } for pid=2953 comm="syz-execprog" path="pipe:[1795]" dev="pipefs" ino=1795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
2025/07/03 17:35:31 executed programs: 2
[ 87.248156][ T29] audit: type=1400 audit(1751564131.834:101): avc: denied { read write } for pid=3989 comm="syz.3.16" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.271577][ T29] audit: type=1400 audit(1751564131.834:102): avc: denied { open } for pid=3989 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.295824][ T29] audit: type=1400 audit(1751564131.894:103): avc: denied { ioctl } for pid=3989 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.559727][ T10] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 87.709569][ T10] usb 4-1: Using ep0 maxpacket: 8
[ 87.717272][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.725664][ T10] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.733974][ T10] usb 4-1: config 162 has 2 interfaces, different from the descriptor's value: 3
[ 87.743199][ T10] usb 4-1: config 162 has no interface number 0
[ 87.749525][ T10] usb 4-1: config 162 has no interface number 1
[ 87.755924][ T10] usb 4-1: config 162 interface 3 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 3
[ 87.768968][ T10] usb 4-1: config 162 interface 2 altsetting 1 has a duplicate endpoint with address 0x9, skipping
[ 87.779778][ T10] usb 4-1: config 162 interface 2 altsetting 1 has an endpoint descriptor with address 0xA6, changing to 0x86
[ 87.791504][ T10] usb 4-1: config 162 interface 2 altsetting 1 endpoint 0x86 has invalid maxpacket 23105, setting to 1024
[ 87.802869][ T10] usb 4-1: config 162 interface 2 altsetting 1 bulk endpoint 0x86 has invalid maxpacket 1024
[ 87.813094][ T10] usb 4-1: config 162 interface 2 altsetting 1 has 5 endpoint descriptors, different from the interface descriptor's value: 4
[ 87.826200][ T10] usb 4-1: config 162 interface 3 has no altsetting 0
[ 87.833047][ T10] usb 4-1: config 162 interface 3 has no altsetting 1
[ 87.839893][ T10] usb 4-1: config 162 interface 2 has no altsetting 0
[ 87.849019][ T10] usb 4-1: New USB device found, idVendor=0e8d, idProduct=763f, bcdDevice=9b.23
[ 87.858161][ T10] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 87.866210][ T10] usb 4-1: Product: syz
[ 87.870427][ T10] usb 4-1: Manufacturer: syz
[ 87.875060][ T10] usb 4-1: SerialNumber: syz
[ 88.108760][ T3994] Bluetooth: hci0: Opcode 0x0c03 failed: -71
[ 88.112000][ T10] usb 4-1: USB disconnect, device number 2
[ 88.126239][ T10] ==================================================================
[ 88.134370][ T10] BUG: KASAN: slab-use-after-free in btusb_disconnect+0x4dc/0x580
[ 88.142245][ T10] Read of size 4 at addr ffff8881082817c0 by task kworker/0:1/10
[ 88.150022][ T10]
[ 88.152414][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 88.152454][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 88.152474][ T10] Workqueue: usb_hub_wq hub_event
[ 88.152511][ T10] Call Trace:
[ 88.152522][ T10]
[ 88.152533][ T10] dump_stack_lvl+0x116/0x1f0
[ 88.152589][ T10] print_report+0xcd/0x680
[ 88.152625][ T10] ? __virt_addr_valid+0x81/0x610
[ 88.152666][ T10] ? __phys_addr+0xe8/0x180
[ 88.152706][ T10] ? btusb_disconnect+0x4dc/0x580
[ 88.152737][ T10] kasan_report+0xe0/0x110
[ 88.152775][ T10] ? btusb_disconnect+0x4dc/0x580
[ 88.152812][ T10] btusb_disconnect+0x4dc/0x580
[ 88.152848][ T10] usb_unbind_interface+0x1da/0x9a0
[ 88.152888][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 88.152934][ T10] ? __pfx_usb_unbind_interface+0x10/0x10
[ 88.152970][ T10] device_remove+0x122/0x170
[ 88.153013][ T10] device_release_driver_internal+0x44b/0x620
[ 88.153059][ T10] bus_remove_device+0x22f/0x420
[ 88.153094][ T10] device_del+0x396/0x9f0
[ 88.153131][ T10] ? __pfx_device_del+0x10/0x10
[ 88.153165][ T10] ? kobject_put+0x210/0x5a0
[ 88.153200][ T10] usb_disable_device+0x355/0x7d0
[ 88.153258][ T10] usb_disconnect+0x2e1/0x920
[ 88.153314][ T10] hub_event+0x1aa0/0x5030
[ 88.153357][ T10] ? __lock_acquire+0xb8a/0x1c90
[ 88.153390][ T10] ? __pfx_hub_event+0x10/0x10
[ 88.153417][ T10] ? assoc_array_gc+0xe00/0x15b0
[ 88.153455][ T10] ? rcu_is_watching+0x12/0xc0
[ 88.153500][ T10] process_one_work+0x9cc/0x1b70
[ 88.153545][ T10] ? __pfx_hub_event+0x10/0x10
[ 88.153574][ T10] ? __pfx_process_one_work+0x10/0x10
[ 88.153618][ T10] ? assign_work+0x1a0/0x250
[ 88.153655][ T10] worker_thread+0x6c8/0xf10
[ 88.153699][ T10] ? __kthread_parkme+0x19e/0x250
[ 88.153749][ T10] ? __pfx_worker_thread+0x10/0x10
[ 88.153787][ T10] kthread+0x3c5/0x780
[ 88.153821][ T10] ? __pfx_kthread+0x10/0x10
[ 88.153855][ T10] ? rcu_is_watching+0x12/0xc0
[ 88.153897][ T10] ? __pfx_kthread+0x10/0x10
[ 88.153932][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.153981][ T10] ? __pfx_kthread+0x10/0x10
[ 88.154022][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.154073][ T10]
[ 88.154084][ T10]
[ 88.376518][ T10] Allocated by task 10:
[ 88.380683][ T10] kasan_save_stack+0x33/0x60
[ 88.385380][ T10] kasan_save_track+0x14/0x30
[ 88.390076][ T10] __kasan_kmalloc+0x8f/0xa0
[ 88.394683][ T10] __kmalloc_node_track_caller_noprof+0x212/0x4c0
[ 88.401126][ T10] devm_kmalloc+0xa5/0x260
[ 88.405565][ T10] btusb_probe+0x23f/0x4480
[ 88.410086][ T10] usb_probe_interface+0x300/0x9c0
[ 88.415227][ T10] really_probe+0x241/0xa90
[ 88.419774][ T10] __driver_probe_device+0x1de/0x440
[ 88.425076][ T10] driver_probe_device+0x4c/0x1b0
[ 88.430121][ T10] __device_attach_driver+0x1df/0x310
[ 88.435519][ T10] bus_for_each_drv+0x159/0x1e0
[ 88.440404][ T10] __device_attach+0x1e4/0x4b0
[ 88.445185][ T10] bus_probe_device+0x17f/0x1c0
[ 88.450060][ T10] device_add+0x1148/0x1a70
[ 88.454587][ T10] usb_set_configuration+0x1187/0x1e20
[ 88.460061][ T10] usb_generic_driver_probe+0xb1/0x110
[ 88.465552][ T10] usb_probe_device+0xec/0x3e0
[ 88.470332][ T10] really_probe+0x241/0xa90
[ 88.474852][ T10] __driver_probe_device+0x1de/0x440
[ 88.480159][ T10] driver_probe_device+0x4c/0x1b0
[ 88.485209][ T10] __device_attach_driver+0x1df/0x310
[ 88.490606][ T10] bus_for_each_drv+0x159/0x1e0
[ 88.495486][ T10] __device_attach+0x1e4/0x4b0
[ 88.500270][ T10] bus_probe_device+0x17f/0x1c0
[ 88.505134][ T10] device_add+0x1148/0x1a70
[ 88.509663][ T10] usb_new_device+0xd07/0x1a20
[ 88.514440][ T10] hub_event+0x2f85/0x5030
[ 88.518869][ T10] process_one_work+0x9cc/0x1b70
[ 88.523832][ T10] worker_thread+0x6c8/0xf10
[ 88.528442][ T10] kthread+0x3c5/0x780
[ 88.532529][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.537149][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.541937][ T10]
[ 88.544277][ T10] Freed by task 10:
[ 88.548095][ T10] kasan_save_stack+0x33/0x60
[ 88.552796][ T10] kasan_save_track+0x14/0x30
[ 88.557492][ T10] kasan_save_free_info+0x3b/0x60
[ 88.562544][ T10] __kasan_slab_free+0x37/0x50
[ 88.567327][ T10] kfree+0x283/0x470
[ 88.571245][ T10] release_nodes+0x11e/0x240
[ 88.575862][ T10] devres_release_all+0x112/0x180
[ 88.580911][ T10] device_unbind_cleanup+0x19/0x1b0
[ 88.586129][ T10] device_release_driver_internal+0x4c3/0x620
[ 88.592226][ T10] usb_driver_release_interface+0x109/0x190
[ 88.598154][ T10] btusb_disconnect+0x448/0x580
[ 88.603035][ T10] usb_unbind_interface+0x1da/0x9a0
[ 88.608262][ T10] device_remove+0x122/0x170
[ 88.612879][ T10] device_release_driver_internal+0x44b/0x620
[ 88.618993][ T10] bus_remove_device+0x22f/0x420
[ 88.623963][ T10] device_del+0x396/0x9f0
[ 88.628321][ T10] usb_disable_device+0x355/0x7d0
[ 88.633389][ T10] usb_disconnect+0x2e1/0x920
[ 88.638148][ T10] hub_event+0x1aa0/0x5030
[ 88.642681][ T10] process_one_work+0x9cc/0x1b70
[ 88.647654][ T10] worker_thread+0x6c8/0xf10
[ 88.652275][ T10] kthread+0x3c5/0x780
[ 88.656375][ T10] ret_from_fork+0x5b3/0x6c0
[ 88.661012][ T10] ret_from_fork_asm+0x1a/0x30
[ 88.665810][ T10]
[ 88.668149][ T10] The buggy address belongs to the object at ffff888108281000
[ 88.668149][ T10] which belongs to the cache kmalloc-2k of size 2048
[ 88.682233][ T10] The buggy address is located 1984 bytes inside of
[ 88.682233][ T10] freed 2048-byte region [ffff888108281000, ffff888108281800)
[ 88.696230][ T10]
[ 88.698572][ T10] The buggy address belongs to the physical page:
[ 88.705008][ T10] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108280
[ 88.713888][ T10] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 88.722417][ T10] flags: 0x200000000000040(head|node=0|zone=2)
[ 88.728603][ T10] page_type: f5(slab)
[ 88.732615][ T10] raw: 0200000000000040 ffff888100042000 dead000000000100 dead000000000122
[ 88.741223][ T10] raw: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.749836][ T10] head: 0200000000000040 ffff888100042000 dead000000000100 dead000000000122
[ 88.758538][ T10] head: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.767239][ T10] head: 0200000000000003 ffffea000420a001 00000000ffffffff 00000000ffffffff
[ 88.775947][ T10] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008
[ 88.784641][ T10] page dumped because: kasan: bad access detected
[ 88.791082][ T10] page_owner tracks the page as allocated
[ 88.796817][ T10] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 4007979247, free_ts 0
[ 88.816488][ T10] post_alloc_hook+0x1c0/0x230
[ 88.821292][ T10] get_page_from_freelist+0xf98/0x2ce0
[ 88.826785][ T10] __alloc_frozen_pages_noprof+0x259/0x21e0
[ 88.832716][ T10] alloc_pages_mpol+0xe4/0x410
[ 88.837529][ T10] new_slab+0x23b/0x330
[ 88.841721][ T10] ___slab_alloc+0xda5/0x1940
[ 88.846431][ T10] __slab_alloc.constprop.0+0x56/0xb0
[ 88.851839][ T10] __kmalloc_cache_noprof+0x209/0x3c0
[ 88.857246][ T10] acpi_ds_create_walk_state+0x78/0x250
[ 88.862827][ T10] acpi_ps_execute_method+0x253/0xb30
[ 88.868228][ T10] acpi_ns_evaluate+0x76c/0xca0
[ 88.873111][ T10] acpi_ut_evaluate_object+0xda/0x4a0
[ 88.878514][ T10] acpi_ut_execute_STA+0x87/0x1a0
[ 88.883576][ T10] acpi_ns_get_device_callback+0x23c/0x500
[ 88.889433][ T10] acpi_ns_walk_namespace+0x405/0x5b0
[ 88.894860][ T10] acpi_get_devices+0x137/0x160
[ 88.899756][ T10] page_owner free stack trace missing
[ 88.905139][ T10]
[ 88.907482][ T10] Memory state around the buggy address:
[ 88.913128][ T10] ffff888108281680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.921214][ T10] ffff888108281700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.929303][ T10] >ffff888108281780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.937383][ T10] ^
[ 88.943553][ T10] ffff888108281800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 88.951657][ T10] ffff888108281880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 88.959742][ T10] ==================================================================
[ 88.968073][ T10] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 88.975324][ T10] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 88.987704][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 88.997811][ T10] Workqueue: usb_hub_wq hub_event
[ 89.002901][ T10] Call Trace:
[ 89.006228][ T10]
[ 89.009215][ T10] dump_stack_lvl+0x3d/0x1f0
[ 89.013971][ T10] panic+0x71c/0x800
[ 89.017924][ T10] ? __pfx_panic+0x10/0x10
[ 89.022375][ T10] ? mark_held_locks+0x49/0x80
[ 89.027171][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.032230][ T10] ? check_panic_on_warn+0x1f/0xb0
[ 89.037374][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.042431][ T10] check_panic_on_warn+0xab/0xb0
[ 89.047402][ T10] end_report+0x107/0x170
[ 89.051767][ T10] kasan_report+0xee/0x110
[ 89.056224][ T10] ? btusb_disconnect+0x4dc/0x580
[ 89.061284][ T10] btusb_disconnect+0x4dc/0x580
[ 89.066175][ T10] usb_unbind_interface+0x1da/0x9a0
[ 89.071413][ T10] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 89.077095][ T10] ? __pfx_usb_unbind_interface+0x10/0x10
[ 89.082852][ T10] device_remove+0x122/0x170
[ 89.087477][ T10] device_release_driver_internal+0x44b/0x620
[ 89.093589][ T10] bus_remove_device+0x22f/0x420
[ 89.098561][ T10] device_del+0x396/0x9f0
[ 89.102933][ T10] ? __pfx_device_del+0x10/0x10
[ 89.107820][ T10] ? kobject_put+0x210/0x5a0
[ 89.112441][ T10] usb_disable_device+0x355/0x7d0
[ 89.117519][ T10] usb_disconnect+0x2e1/0x920
[ 89.122250][ T10] hub_event+0x1aa0/0x5030
[ 89.126706][ T10] ? __lock_acquire+0xb8a/0x1c90
[ 89.131680][ T10] ? __pfx_hub_event+0x10/0x10
[ 89.136475][ T10] ? assoc_array_gc+0xe00/0x15b0
[ 89.141453][ T10] ? rcu_is_watching+0x12/0xc0
[ 89.146292][ T10] process_one_work+0x9cc/0x1b70
[ 89.151267][ T10] ? __pfx_hub_event+0x10/0x10
[ 89.156060][ T10] ? __pfx_process_one_work+0x10/0x10
[ 89.161822][ T10] ? assign_work+0x1a0/0x250
[ 89.166443][ T10] worker_thread+0x6c8/0xf10
[ 89.171077][ T10] ? __kthread_parkme+0x19e/0x250
[ 89.176148][ T10] ? __pfx_worker_thread+0x10/0x10
[ 89.181298][ T10] kthread+0x3c5/0x780
[ 89.185403][ T10] ? __pfx_kthread+0x10/0x10
[ 89.190026][ T10] ? rcu_is_watching+0x12/0xc0
[ 89.194847][ T10] ? __pfx_kthread+0x10/0x10
[ 89.199473][ T10] ret_from_fork+0x5b3/0x6c0
[ 89.204109][ T10] ? __pfx_kthread+0x10/0x10
[ 89.208730][ T10] ret_from_fork_asm+0x1a/0x30
[ 89.213539][ T10]
[ 89.216850][ T10] Kernel Offset: disabled
[ 89.221191][ T10] Rebooting in 86400 seconds..