syzkaller login: [ 31.553859][ T29] kauditd_printk_skb: 28 callbacks suppressed
[ 31.553883][ T29] audit: type=1400 audit(1759722146.789:55): avc: denied { read open } for pid=2920 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=468 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 32.733237][ T29] audit: type=1400 audit(1759722147.969:56): avc: denied { transition } for pid=2938 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 32.756059][ T29] audit: type=1400 audit(1759722147.969:57): avc: denied { noatsecure } for pid=2938 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 32.775853][ T29] audit: type=1400 audit(1759722147.969:58): avc: denied { write } for pid=2938 comm="sh" path="pipe:[1478]" dev="pipefs" ino=1478 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[ 32.798065][ T29] audit: type=1400 audit(1759722147.969:59): avc: denied { rlimitinh } for pid=2938 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 32.816944][ T29] audit: type=1400 audit(1759722147.969:60): avc: denied { siginh } for pid=2938 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 37.643984][ T2941] sshd-session (2941) used greatest stack depth: 23656 bytes left
[ 41.014905][ T2947] sshd-session (2947) used greatest stack depth: 23112 bytes left
Warning: Permanently added '10.128.10.14' (ED25519) to the list of known hosts.
2025/10/06 03:42:43 parsed 1 programs
[ 48.502439][ T29] audit: type=1400 audit(1759722163.739:61): avc: denied { node_bind } for pid=2959 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 48.523390][ T29] audit: type=1400 audit(1759722163.739:62): avc: denied { module_request } for pid=2959 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 51.267694][ T29] audit: type=1400 audit(1759722166.499:63): avc: denied { mounton } for pid=2969 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 51.273544][ T2969] cgroup: Unknown subsys name 'net'
[ 51.291082][ T29] audit: type=1400 audit(1759722166.499:64): avc: denied { mount } for pid=2969 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 51.318753][ T29] audit: type=1400 audit(1759722166.539:65): avc: denied { unmount } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 51.445078][ T2969] cgroup: Unknown subsys name 'cpuset'
[ 51.453943][ T2969] cgroup: Unknown subsys name 'rlimit'
[ 51.653674][ T29] audit: type=1400 audit(1759722166.889:66): avc: denied { setattr } for pid=2969 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 51.677139][ T29] audit: type=1400 audit(1759722166.889:67): avc: denied { create } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.697734][ T29] audit: type=1400 audit(1759722166.889:68): avc: denied { write } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.718186][ T29] audit: type=1400 audit(1759722166.889:69): avc: denied { read } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.739296][ T29] audit: type=1400 audit(1759722166.939:70): avc: denied { sys_module } for pid=2969 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 51.841636][ T2974] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 51.931994][ T2969] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 53.477370][ T2976] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 58.112971][ T29] kauditd_printk_skb: 24 callbacks suppressed
[ 58.112998][ T29] audit: type=1400 audit(1759722173.349:95): avc: denied { create } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 58.140232][ T29] audit: type=1400 audit(1759722173.349:96): avc: denied { write } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 58.165139][ T29] audit: type=1400 audit(1759722173.399:97): avc: denied { read } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 69.086713][ T2995] syz-executor (2995) used greatest stack depth: 22968 bytes left
[ 69.736906][ T29] audit: type=1401 audit(1759722184.969:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
[ 70.507324][ T29] audit: type=1400 audit(1759722185.739:99): avc: denied { create } for pid=3485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
2025/10/06 03:43:06 executed programs: 0
[ 71.545725][ T29] audit: type=1400 audit(1759722186.789:100): avc: denied { write } for pid=2959 comm="syz-execprog" path="pipe:[2392]" dev="pipefs" ino=2392 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
2025/10/06 03:43:21 executed programs: 2
[ 86.106012][ T29] audit: type=1400 audit(1759722201.339:101): avc: denied { read write } for pid=3953 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 86.129484][ T29] audit: type=1400 audit(1759722201.339:102): avc: denied { open } for pid=3953 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 86.152720][ T29] audit: type=1400 audit(1759722201.339:103): avc: denied { ioctl } for pid=3953 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 86.342328][ T1123] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 86.492179][ T1123] usb 4-1: Using ep0 maxpacket: 8
[ 86.499557][ T1123] usb 4-1: unable to get BOS descriptor or descriptor too short
[ 86.508921][ T1123] usb 4-1: config 0 has an invalid interface number: 44 but max is 0
[ 86.517161][ T1123] usb 4-1: config 0 has no interface number 0
[ 86.523338][ T1123] usb 4-1: config 0 interface 44 has no altsetting 0
[ 86.532141][ T1123] usb 4-1: New USB device found, idVendor=0424, idProduct=cf30, bcdDevice=31.09
[ 86.541207][ T1123] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 86.549447][ T1123] usb 4-1: Product: syz
[ 86.553701][ T1123] usb 4-1: Manufacturer: syz
[ 86.558316][ T1123] usb 4-1: SerialNumber: syz
[ 86.566629][ T1123] usb 4-1: config 0 descriptor??
[ 86.792826][ T1123] usb 4-1: USB disconnect, device number 2
[ 86.804184][ T1123] ==================================================================
[ 86.812291][ T1123] BUG: KASAN: slab-use-after-free in hdm_disconnect+0x227/0x250
[ 86.820023][ T1123] Read of size 8 at addr ffff88811bc3d898 by task kworker/0:2/1123
[ 86.827957][ T1123]
[ 86.830347][ T1123] CPU: 0 UID: 0 PID: 1123 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary)
[ 86.830396][ T1123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 86.830417][ T1123] Workqueue: usb_hub_wq hub_event
[ 86.830474][ T1123] Call Trace:
[ 86.830485][ T1123]
[ 86.830497][ T1123] dump_stack_lvl+0x116/0x1f0
[ 86.830538][ T1123] print_report+0xcd/0x630
[ 86.830580][ T1123] ? __virt_addr_valid+0x81/0x610
[ 86.830624][ T1123] ? __phys_addr+0xe8/0x180
[ 86.830668][ T1123] ? hdm_disconnect+0x227/0x250
[ 86.830711][ T1123] kasan_report+0xe0/0x110
[ 86.830754][ T1123] ? hdm_disconnect+0x227/0x250
[ 86.830815][ T1123] hdm_disconnect+0x227/0x250
[ 86.830857][ T1123] usb_unbind_interface+0x1da/0x9e0
[ 86.830893][ T1123] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 86.830934][ T1123] ? __pfx_usb_unbind_interface+0x10/0x10
[ 86.830966][ T1123] device_remove+0x122/0x170
[ 86.831013][ T1123] device_release_driver_internal+0x44b/0x620
[ 86.831071][ T1123] bus_remove_device+0x22f/0x420
[ 86.831118][ T1123] device_del+0x396/0x9f0
[ 86.831169][ T1123] ? __pfx_device_del+0x10/0x10
[ 86.831217][ T1123] ? __pfx___mutex_lock+0x10/0x10
[ 86.831249][ T1123] ? __pfx___pm_runtime_barrier+0x10/0x10
[ 86.831300][ T1123] ? do_raw_spin_lock+0x12c/0x2b0
[ 86.831342][ T1123] usb_disable_device+0x355/0x7d0
[ 86.831399][ T1123] ? lockdep_hardirqs_on+0x7c/0x110
[ 86.831455][ T1123] usb_disconnect+0x2e1/0x9c0
[ 86.831505][ T1123] hub_event+0x1aa2/0x5060
[ 86.831566][ T1123] ? __lock_acquire+0xb97/0x1ce0
[ 86.831600][ T1123] ? __pfx_hub_event+0x10/0x10
[ 86.831646][ T1123] ? interval_tree_remove+0x850/0xee0
[ 86.831697][ T1123] ? rcu_is_watching+0x12/0xc0
[ 86.831745][ T1123] process_one_work+0x9cf/0x1b70
[ 86.831794][ T1123] ? __pfx_hub_event+0x10/0x10
[ 86.831843][ T1123] ? __pfx_process_one_work+0x10/0x10
[ 86.831890][ T1123] ? assign_work+0x1a0/0x250
[ 86.831931][ T1123] worker_thread+0x6c8/0xf10
[ 86.831992][ T1123] ? __kthread_parkme+0x19e/0x250
[ 86.832022][ T1123] ? __pfx_worker_thread+0x10/0x10
[ 86.832060][ T1123] kthread+0x3c5/0x780
[ 86.832098][ T1123] ? __pfx_kthread+0x10/0x10
[ 86.832137][ T1123] ? rcu_is_watching+0x12/0xc0
[ 86.832179][ T1123] ? __pfx_kthread+0x10/0x10
[ 86.832218][ T1123] ret_from_fork+0x56d/0x700
[ 86.832248][ T1123] ? __pfx_kthread+0x10/0x10
[ 86.832286][ T1123] ret_from_fork_asm+0x1a/0x30
[ 86.832336][ T1123]
[ 86.832346][ T1123]
[ 87.068741][ T1123] Allocated by task 1123:
[ 87.073091][ T1123] kasan_save_stack+0x33/0x60
[ 87.077779][ T1123] kasan_save_track+0x14/0x30
[ 87.082473][ T1123] __kasan_kmalloc+0x8f/0xa0
[ 87.087079][ T1123] hdm_probe+0xb3/0x19a0
[ 87.091337][ T1123] usb_probe_interface+0x303/0xa40
[ 87.096457][ T1123] really_probe+0x241/0xa90
[ 87.100980][ T1123] __driver_probe_device+0x1de/0x440
[ 87.106369][ T1123] driver_probe_device+0x4c/0x1b0
[ 87.111425][ T1123] __device_attach_driver+0x1df/0x310
[ 87.116820][ T1123] bus_for_each_drv+0x159/0x1e0
[ 87.121678][ T1123] __device_attach+0x1e4/0x4b0
[ 87.126462][ T1123] bus_probe_device+0x17f/0x1c0
[ 87.131325][ T1123] device_add+0x1148/0x1aa0
[ 87.135832][ T1123] usb_set_configuration+0x1187/0x1e20
[ 87.141308][ T1123] usb_generic_driver_probe+0xb1/0x110
[ 87.146776][ T1123] usb_probe_device+0xec/0x3e0
[ 87.151550][ T1123] really_probe+0x241/0xa90
[ 87.156075][ T1123] __driver_probe_device+0x1de/0x440
[ 87.161387][ T1123] driver_probe_device+0x4c/0x1b0
[ 87.166436][ T1123] __device_attach_driver+0x1df/0x310
[ 87.171829][ T1123] bus_for_each_drv+0x159/0x1e0
[ 87.176706][ T1123] __device_attach+0x1e4/0x4b0
[ 87.181490][ T1123] bus_probe_device+0x17f/0x1c0
[ 87.186358][ T1123] device_add+0x1148/0x1aa0
[ 87.190876][ T1123] usb_new_device+0xd07/0x1a60
[ 87.195659][ T1123] hub_event+0x2fce/0x5060
[ 87.200104][ T1123] process_one_work+0x9cf/0x1b70
[ 87.205079][ T1123] worker_thread+0x6c8/0xf10
[ 87.209694][ T1123] kthread+0x3c5/0x780
[ 87.213775][ T1123] ret_from_fork+0x56d/0x700
[ 87.218463][ T1123] ret_from_fork_asm+0x1a/0x30
[ 87.223265][ T1123]
[ 87.225614][ T1123] Freed by task 1123:
[ 87.229597][ T1123] kasan_save_stack+0x33/0x60
[ 87.234295][ T1123] kasan_save_track+0x14/0x30
[ 87.238998][ T1123] kasan_save_free_info+0x3b/0x60
[ 87.244030][ T1123] __kasan_slab_free+0x3e/0x50
[ 87.248814][ T1123] kfree+0x283/0x470
[ 87.252730][ T1123] device_release+0xa4/0x240
[ 87.257351][ T1123] kobject_put+0x1e7/0x5a0
[ 87.261794][ T1123] device_unregister+0x2f/0xc0
[ 87.266586][ T1123] hdm_disconnect+0x10b/0x250
[ 87.271280][ T1123] usb_unbind_interface+0x1da/0x9e0
[ 87.276490][ T1123] device_remove+0x122/0x170
[ 87.281127][ T1123] device_release_driver_internal+0x44b/0x620
[ 87.287226][ T1123] bus_remove_device+0x22f/0x420
[ 87.292198][ T1123] device_del+0x396/0x9f0
[ 87.296561][ T1123] usb_disable_device+0x355/0x7d0
[ 87.301617][ T1123] usb_disconnect+0x2e1/0x9c0
[ 87.306320][ T1123] hub_event+0x1aa2/0x5060
[ 87.310773][ T1123] process_one_work+0x9cf/0x1b70
[ 87.315738][ T1123] worker_thread+0x6c8/0xf10
[ 87.320358][ T1123] kthread+0x3c5/0x780
[ 87.324450][ T1123] ret_from_fork+0x56d/0x700
[ 87.329054][ T1123] ret_from_fork_asm+0x1a/0x30
[ 87.333845][ T1123]
[ 87.336180][ T1123] The buggy address belongs to the object at ffff88811bc3c000
[ 87.336180][ T1123] which belongs to the cache kmalloc-8k of size 8192
[ 87.350244][ T1123] The buggy address is located 6296 bytes inside of
[ 87.350244][ T1123] freed 8192-byte region [ffff88811bc3c000, ffff88811bc3e000)
[ 87.364236][ T1123]
[ 87.366571][ T1123] The buggy address belongs to the physical page:
[ 87.373002][ T1123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11bc38
[ 87.381865][ T1123] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 87.390382][ T1123] flags: 0x200000000000040(head|node=0|zone=2)
[ 87.396560][ T1123] page_type: f5(slab)
[ 87.400572][ T1123] raw: 0200000000000040 ffff888100042280 ffffea00046de400 0000000000000002
[ 87.409186][ T1123] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[ 87.417791][ T1123] head: 0200000000000040 ffff888100042280 ffffea00046de400 0000000000000002
[ 87.426478][ T1123] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[ 87.435161][ T1123] head: 0200000000000003 ffffea00046f0e01 00000000ffffffff 00000000ffffffff
[ 87.443863][ T1123] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008
[ 87.452539][ T1123] page dumped because: kasan: bad access detected
[ 87.458967][ T1123] page_owner tracks the page as allocated
[ 87.464698][ T1123] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2983, tgid 2983 (syz-executor), ts 53759047083, free_ts 53558172405
[ 87.486104][ T1123] post_alloc_hook+0x1c0/0x230
[ 87.490904][ T1123] get_page_from_freelist+0xf98/0x2ce0
[ 87.496394][ T1123] __alloc_frozen_pages_noprof+0x259/0x21e0
[ 87.502341][ T1123] alloc_pages_mpol+0xe4/0x410
[ 87.507144][ T1123] new_slab+0x247/0x330
[ 87.511341][ T1123] ___slab_alloc+0xc55/0x1620
[ 87.516053][ T1123] __slab_alloc.constprop.0+0x56/0xb0
[ 87.521459][ T1123] __kmalloc_node_track_caller_noprof+0x15e/0x4c0
[ 87.527893][ T1123] kmemdup_noprof+0x29/0x60
[ 87.532416][ T1123] ipv4_sysctl_init_net+0x3e/0x350
[ 87.537543][ T1123] ops_init+0x1df/0x5f0
[ 87.541715][ T1123] setup_net+0x10f/0x380
[ 87.545982][ T1123] copy_net_ns+0x2a6/0x5f0
[ 87.550437][ T1123] create_new_namespaces+0x3ea/0xa90
[ 87.555756][ T1123] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 87.561410][ T1123] ksys_unshare+0x45b/0xa40
[ 87.565937][ T1123] page last free pid 2977 tgid 2977 stack trace:
[ 87.572271][ T1123] __free_frozen_pages+0x78a/0xfd0
[ 87.577413][ T1123] __put_partials+0x165/0x1c0
[ 87.582116][ T1123] qlist_free_all+0x4d/0x120
[ 87.586725][ T1123] kasan_quarantine_reduce+0x195/0x1e0
[ 87.592232][ T1123] __kasan_slab_alloc+0x4e/0x70
[ 87.597105][ T1123] kmem_cache_alloc_noprof+0x14f/0x3b0
[ 87.602614][ T1123] getname_flags.part.0+0x4c/0x550
[ 87.607874][ T1123] getname_flags+0x93/0xf0
[ 87.612307][ T1123] __x64_sys_rename+0x58/0xa0
[ 87.617013][ T1123] do_syscall_64+0xcd/0x4d0
[ 87.621539][ T1123] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 87.627454][ T1123]
[ 87.629786][ T1123] Memory state around the buggy address:
[ 87.635423][ T1123] ffff88811bc3d780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 87.643513][ T1123] ffff88811bc3d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 87.651588][ T1123] >ffff88811bc3d880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 87.659662][ T1123] ^
[ 87.664617][ T1123] ffff88811bc3d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 87.672694][ T1123] ffff88811bc3d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 87.680857][ T1123] ==================================================================
[ 87.689295][ T1123] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 87.696537][ T1123] CPU: 0 UID: 0 PID: 1123 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary)
[ 87.706388][ T1123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
[ 87.716487][ T1123] Workqueue: usb_hub_wq hub_event
[ 87.721587][ T1123] Call Trace:
[ 87.724892][ T1123]
[ 87.727849][ T1123] dump_stack_lvl+0x3d/0x1f0
[ 87.732469][ T1123] vpanic+0x6e8/0x7a0
[ 87.736482][ T1123] ? __pfx_vpanic+0x10/0x10
[ 87.741014][ T1123] ? hdm_disconnect+0x227/0x250
[ 87.745891][ T1123] panic+0xca/0xd0
[ 87.749639][ T1123] ? __pfx_panic+0x10/0x10
[ 87.754091][ T1123] ? check_panic_on_warn+0x1f/0xb0
[ 87.759324][ T1123] check_panic_on_warn+0xab/0xb0
[ 87.764289][ T1123] end_report+0x107/0x170
[ 87.768689][ T1123] kasan_report+0xee/0x110
[ 87.773160][ T1123] ? hdm_disconnect+0x227/0x250
[ 87.778042][ T1123] hdm_disconnect+0x227/0x250
[ 87.782748][ T1123] usb_unbind_interface+0x1da/0x9e0
[ 87.787973][ T1123] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 87.794077][ T1123] ? __pfx_usb_unbind_interface+0x10/0x10
[ 87.799820][ T1123] device_remove+0x122/0x170
[ 87.804448][ T1123] device_release_driver_internal+0x44b/0x620
[ 87.810560][ T1123] bus_remove_device+0x22f/0x420
[ 87.815529][ T1123] device_del+0x396/0x9f0
[ 87.819925][ T1123] ? __pfx_device_del+0x10/0x10
[ 87.824808][ T1123] ? __pfx___mutex_lock+0x10/0x10
[ 87.829849][ T1123] ? __pfx___pm_runtime_barrier+0x10/0x10
[ 87.835602][ T1123] ? do_raw_spin_lock+0x12c/0x2b0
[ 87.840654][ T1123] usb_disable_device+0x355/0x7d0
[ 87.845712][ T1123] ? lockdep_hardirqs_on+0x7c/0x110
[ 87.850950][ T1123] usb_disconnect+0x2e1/0x9c0
[ 87.855663][ T1123] hub_event+0x1aa2/0x5060
[ 87.860124][ T1123] ? __lock_acquire+0xb97/0x1ce0
[ 87.865087][ T1123] ? __pfx_hub_event+0x10/0x10
[ 87.869886][ T1123] ? interval_tree_remove+0x850/0xee0
[ 87.875299][ T1123] ? rcu_is_watching+0x12/0xc0
[ 87.880113][ T1123] process_one_work+0x9cf/0x1b70
[ 87.885083][ T1123] ? __pfx_hub_event+0x10/0x10
[ 87.889886][ T1123] ? __pfx_process_one_work+0x10/0x10
[ 87.895291][ T1123] ? assign_work+0x1a0/0x250
[ 87.899916][ T1123] worker_thread+0x6c8/0xf10
[ 87.904535][ T1123] ? __kthread_parkme+0x19e/0x250
[ 87.909578][ T1123] ? __pfx_worker_thread+0x10/0x10
[ 87.914812][ T1123] kthread+0x3c5/0x780
[ 87.918909][ T1123] ? __pfx_kthread+0x10/0x10
[ 87.923522][ T1123] ? rcu_is_watching+0x12/0xc0
[ 87.928319][ T1123] ? __pfx_kthread+0x10/0x10
[ 87.932936][ T1123] ret_from_fork+0x56d/0x700
[ 87.937573][ T1123] ? __pfx_kthread+0x10/0x10
[ 87.942205][ T1123] ret_from_fork_asm+0x1a/0x30
[ 87.947103][ T1123]
[ 87.950426][ T1123] Kernel Offset: disabled
[ 87.954755][ T1123] Rebooting in 86400 seconds..