syzkaller login: [ 31.553859][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 31.553883][ T29] audit: type=1400 audit(1759722146.789:55): avc: denied { read open } for pid=2920 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=468 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 32.733237][ T29] audit: type=1400 audit(1759722147.969:56): avc: denied { transition } for pid=2938 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.756059][ T29] audit: type=1400 audit(1759722147.969:57): avc: denied { noatsecure } for pid=2938 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.775853][ T29] audit: type=1400 audit(1759722147.969:58): avc: denied { write } for pid=2938 comm="sh" path="pipe:[1478]" dev="pipefs" ino=1478 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 32.798065][ T29] audit: type=1400 audit(1759722147.969:59): avc: denied { rlimitinh } for pid=2938 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 32.816944][ T29] audit: type=1400 audit(1759722147.969:60): avc: denied { siginh } for pid=2938 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 37.643984][ T2941] sshd-session (2941) used greatest stack depth: 23656 bytes left [ 41.014905][ T2947] sshd-session (2947) used greatest stack depth: 23112 bytes left Warning: Permanently added '10.128.10.14' (ED25519) to the list of known hosts. 2025/10/06 03:42:43 parsed 1 programs [ 48.502439][ T29] audit: type=1400 audit(1759722163.739:61): avc: denied { node_bind } for pid=2959 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 48.523390][ T29] audit: type=1400 audit(1759722163.739:62): avc: denied { module_request } for pid=2959 comm="syz-execprog" kmod="net-pf-2-proto-262-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 51.267694][ T29] audit: type=1400 audit(1759722166.499:63): avc: denied { mounton } for pid=2969 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 51.273544][ T2969] cgroup: Unknown subsys name 'net' [ 51.291082][ T29] audit: type=1400 audit(1759722166.499:64): avc: denied { mount } for pid=2969 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 51.318753][ T29] audit: type=1400 audit(1759722166.539:65): avc: denied { unmount } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 51.445078][ T2969] cgroup: Unknown subsys name 'cpuset' [ 51.453943][ T2969] cgroup: Unknown subsys name 'rlimit' [ 51.653674][ T29] audit: type=1400 audit(1759722166.889:66): avc: denied { setattr } for pid=2969 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.677139][ T29] audit: type=1400 audit(1759722166.889:67): avc: denied { create } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 51.697734][ T29] audit: type=1400 audit(1759722166.889:68): avc: denied { write } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 51.718186][ T29] audit: type=1400 audit(1759722166.889:69): avc: denied { read } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 51.739296][ T29] audit: type=1400 audit(1759722166.939:70): avc: denied { sys_module } for pid=2969 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 51.841636][ T2974] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 51.931994][ T2969] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 53.477370][ T2976] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 58.112971][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 58.112998][ T29] audit: type=1400 audit(1759722173.349:95): avc: denied { create } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.140232][ T29] audit: type=1400 audit(1759722173.349:96): avc: denied { write } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 58.165139][ T29] audit: type=1400 audit(1759722173.399:97): avc: denied { read } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.086713][ T2995] syz-executor (2995) used greatest stack depth: 22968 bytes left [ 69.736906][ T29] audit: type=1401 audit(1759722184.969:98): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768" [ 70.507324][ T29] audit: type=1400 audit(1759722185.739:99): avc: denied { create } for pid=3485 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 2025/10/06 03:43:06 executed programs: 0 [ 71.545725][ T29] audit: type=1400 audit(1759722186.789:100): avc: denied { write } for pid=2959 comm="syz-execprog" path="pipe:[2392]" dev="pipefs" ino=2392 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 2025/10/06 03:43:21 executed programs: 2 [ 86.106012][ T29] audit: type=1400 audit(1759722201.339:101): avc: denied { read write } for pid=3953 comm="syz.3.17" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.129484][ T29] audit: type=1400 audit(1759722201.339:102): avc: denied { open } for pid=3953 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.152720][ T29] audit: type=1400 audit(1759722201.339:103): avc: denied { ioctl } for pid=3953 comm="syz.3.17" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.342328][ T1123] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 86.492179][ T1123] usb 4-1: Using ep0 maxpacket: 8 [ 86.499557][ T1123] usb 4-1: unable to get BOS descriptor or descriptor too short [ 86.508921][ T1123] usb 4-1: config 0 has an invalid interface number: 44 but max is 0 [ 86.517161][ T1123] usb 4-1: config 0 has no interface number 0 [ 86.523338][ T1123] usb 4-1: config 0 interface 44 has no altsetting 0 [ 86.532141][ T1123] usb 4-1: New USB device found, idVendor=0424, idProduct=cf30, bcdDevice=31.09 [ 86.541207][ T1123] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 86.549447][ T1123] usb 4-1: Product: syz [ 86.553701][ T1123] usb 4-1: Manufacturer: syz [ 86.558316][ T1123] usb 4-1: SerialNumber: syz [ 86.566629][ T1123] usb 4-1: config 0 descriptor?? [ 86.792826][ T1123] usb 4-1: USB disconnect, device number 2 [ 86.804184][ T1123] ================================================================== [ 86.812291][ T1123] BUG: KASAN: slab-use-after-free in hdm_disconnect+0x227/0x250 [ 86.820023][ T1123] Read of size 8 at addr ffff88811bc3d898 by task kworker/0:2/1123 [ 86.827957][ T1123] [ 86.830347][ T1123] CPU: 0 UID: 0 PID: 1123 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 86.830396][ T1123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 86.830417][ T1123] Workqueue: usb_hub_wq hub_event [ 86.830474][ T1123] Call Trace: [ 86.830485][ T1123] [ 86.830497][ T1123] dump_stack_lvl+0x116/0x1f0 [ 86.830538][ T1123] print_report+0xcd/0x630 [ 86.830580][ T1123] ? __virt_addr_valid+0x81/0x610 [ 86.830624][ T1123] ? __phys_addr+0xe8/0x180 [ 86.830668][ T1123] ? hdm_disconnect+0x227/0x250 [ 86.830711][ T1123] kasan_report+0xe0/0x110 [ 86.830754][ T1123] ? hdm_disconnect+0x227/0x250 [ 86.830815][ T1123] hdm_disconnect+0x227/0x250 [ 86.830857][ T1123] usb_unbind_interface+0x1da/0x9e0 [ 86.830893][ T1123] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 86.830934][ T1123] ? __pfx_usb_unbind_interface+0x10/0x10 [ 86.830966][ T1123] device_remove+0x122/0x170 [ 86.831013][ T1123] device_release_driver_internal+0x44b/0x620 [ 86.831071][ T1123] bus_remove_device+0x22f/0x420 [ 86.831118][ T1123] device_del+0x396/0x9f0 [ 86.831169][ T1123] ? __pfx_device_del+0x10/0x10 [ 86.831217][ T1123] ? __pfx___mutex_lock+0x10/0x10 [ 86.831249][ T1123] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 86.831300][ T1123] ? do_raw_spin_lock+0x12c/0x2b0 [ 86.831342][ T1123] usb_disable_device+0x355/0x7d0 [ 86.831399][ T1123] ? lockdep_hardirqs_on+0x7c/0x110 [ 86.831455][ T1123] usb_disconnect+0x2e1/0x9c0 [ 86.831505][ T1123] hub_event+0x1aa2/0x5060 [ 86.831566][ T1123] ? __lock_acquire+0xb97/0x1ce0 [ 86.831600][ T1123] ? __pfx_hub_event+0x10/0x10 [ 86.831646][ T1123] ? interval_tree_remove+0x850/0xee0 [ 86.831697][ T1123] ? rcu_is_watching+0x12/0xc0 [ 86.831745][ T1123] process_one_work+0x9cf/0x1b70 [ 86.831794][ T1123] ? __pfx_hub_event+0x10/0x10 [ 86.831843][ T1123] ? __pfx_process_one_work+0x10/0x10 [ 86.831890][ T1123] ? assign_work+0x1a0/0x250 [ 86.831931][ T1123] worker_thread+0x6c8/0xf10 [ 86.831992][ T1123] ? __kthread_parkme+0x19e/0x250 [ 86.832022][ T1123] ? __pfx_worker_thread+0x10/0x10 [ 86.832060][ T1123] kthread+0x3c5/0x780 [ 86.832098][ T1123] ? __pfx_kthread+0x10/0x10 [ 86.832137][ T1123] ? rcu_is_watching+0x12/0xc0 [ 86.832179][ T1123] ? __pfx_kthread+0x10/0x10 [ 86.832218][ T1123] ret_from_fork+0x56d/0x700 [ 86.832248][ T1123] ? __pfx_kthread+0x10/0x10 [ 86.832286][ T1123] ret_from_fork_asm+0x1a/0x30 [ 86.832336][ T1123] [ 86.832346][ T1123] [ 87.068741][ T1123] Allocated by task 1123: [ 87.073091][ T1123] kasan_save_stack+0x33/0x60 [ 87.077779][ T1123] kasan_save_track+0x14/0x30 [ 87.082473][ T1123] __kasan_kmalloc+0x8f/0xa0 [ 87.087079][ T1123] hdm_probe+0xb3/0x19a0 [ 87.091337][ T1123] usb_probe_interface+0x303/0xa40 [ 87.096457][ T1123] really_probe+0x241/0xa90 [ 87.100980][ T1123] __driver_probe_device+0x1de/0x440 [ 87.106369][ T1123] driver_probe_device+0x4c/0x1b0 [ 87.111425][ T1123] __device_attach_driver+0x1df/0x310 [ 87.116820][ T1123] bus_for_each_drv+0x159/0x1e0 [ 87.121678][ T1123] __device_attach+0x1e4/0x4b0 [ 87.126462][ T1123] bus_probe_device+0x17f/0x1c0 [ 87.131325][ T1123] device_add+0x1148/0x1aa0 [ 87.135832][ T1123] usb_set_configuration+0x1187/0x1e20 [ 87.141308][ T1123] usb_generic_driver_probe+0xb1/0x110 [ 87.146776][ T1123] usb_probe_device+0xec/0x3e0 [ 87.151550][ T1123] really_probe+0x241/0xa90 [ 87.156075][ T1123] __driver_probe_device+0x1de/0x440 [ 87.161387][ T1123] driver_probe_device+0x4c/0x1b0 [ 87.166436][ T1123] __device_attach_driver+0x1df/0x310 [ 87.171829][ T1123] bus_for_each_drv+0x159/0x1e0 [ 87.176706][ T1123] __device_attach+0x1e4/0x4b0 [ 87.181490][ T1123] bus_probe_device+0x17f/0x1c0 [ 87.186358][ T1123] device_add+0x1148/0x1aa0 [ 87.190876][ T1123] usb_new_device+0xd07/0x1a60 [ 87.195659][ T1123] hub_event+0x2fce/0x5060 [ 87.200104][ T1123] process_one_work+0x9cf/0x1b70 [ 87.205079][ T1123] worker_thread+0x6c8/0xf10 [ 87.209694][ T1123] kthread+0x3c5/0x780 [ 87.213775][ T1123] ret_from_fork+0x56d/0x700 [ 87.218463][ T1123] ret_from_fork_asm+0x1a/0x30 [ 87.223265][ T1123] [ 87.225614][ T1123] Freed by task 1123: [ 87.229597][ T1123] kasan_save_stack+0x33/0x60 [ 87.234295][ T1123] kasan_save_track+0x14/0x30 [ 87.238998][ T1123] kasan_save_free_info+0x3b/0x60 [ 87.244030][ T1123] __kasan_slab_free+0x3e/0x50 [ 87.248814][ T1123] kfree+0x283/0x470 [ 87.252730][ T1123] device_release+0xa4/0x240 [ 87.257351][ T1123] kobject_put+0x1e7/0x5a0 [ 87.261794][ T1123] device_unregister+0x2f/0xc0 [ 87.266586][ T1123] hdm_disconnect+0x10b/0x250 [ 87.271280][ T1123] usb_unbind_interface+0x1da/0x9e0 [ 87.276490][ T1123] device_remove+0x122/0x170 [ 87.281127][ T1123] device_release_driver_internal+0x44b/0x620 [ 87.287226][ T1123] bus_remove_device+0x22f/0x420 [ 87.292198][ T1123] device_del+0x396/0x9f0 [ 87.296561][ T1123] usb_disable_device+0x355/0x7d0 [ 87.301617][ T1123] usb_disconnect+0x2e1/0x9c0 [ 87.306320][ T1123] hub_event+0x1aa2/0x5060 [ 87.310773][ T1123] process_one_work+0x9cf/0x1b70 [ 87.315738][ T1123] worker_thread+0x6c8/0xf10 [ 87.320358][ T1123] kthread+0x3c5/0x780 [ 87.324450][ T1123] ret_from_fork+0x56d/0x700 [ 87.329054][ T1123] ret_from_fork_asm+0x1a/0x30 [ 87.333845][ T1123] [ 87.336180][ T1123] The buggy address belongs to the object at ffff88811bc3c000 [ 87.336180][ T1123] which belongs to the cache kmalloc-8k of size 8192 [ 87.350244][ T1123] The buggy address is located 6296 bytes inside of [ 87.350244][ T1123] freed 8192-byte region [ffff88811bc3c000, ffff88811bc3e000) [ 87.364236][ T1123] [ 87.366571][ T1123] The buggy address belongs to the physical page: [ 87.373002][ T1123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11bc38 [ 87.381865][ T1123] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 87.390382][ T1123] flags: 0x200000000000040(head|node=0|zone=2) [ 87.396560][ T1123] page_type: f5(slab) [ 87.400572][ T1123] raw: 0200000000000040 ffff888100042280 ffffea00046de400 0000000000000002 [ 87.409186][ T1123] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 87.417791][ T1123] head: 0200000000000040 ffff888100042280 ffffea00046de400 0000000000000002 [ 87.426478][ T1123] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 87.435161][ T1123] head: 0200000000000003 ffffea00046f0e01 00000000ffffffff 00000000ffffffff [ 87.443863][ T1123] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008 [ 87.452539][ T1123] page dumped because: kasan: bad access detected [ 87.458967][ T1123] page_owner tracks the page as allocated [ 87.464698][ T1123] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2983, tgid 2983 (syz-executor), ts 53759047083, free_ts 53558172405 [ 87.486104][ T1123] post_alloc_hook+0x1c0/0x230 [ 87.490904][ T1123] get_page_from_freelist+0xf98/0x2ce0 [ 87.496394][ T1123] __alloc_frozen_pages_noprof+0x259/0x21e0 [ 87.502341][ T1123] alloc_pages_mpol+0xe4/0x410 [ 87.507144][ T1123] new_slab+0x247/0x330 [ 87.511341][ T1123] ___slab_alloc+0xc55/0x1620 [ 87.516053][ T1123] __slab_alloc.constprop.0+0x56/0xb0 [ 87.521459][ T1123] __kmalloc_node_track_caller_noprof+0x15e/0x4c0 [ 87.527893][ T1123] kmemdup_noprof+0x29/0x60 [ 87.532416][ T1123] ipv4_sysctl_init_net+0x3e/0x350 [ 87.537543][ T1123] ops_init+0x1df/0x5f0 [ 87.541715][ T1123] setup_net+0x10f/0x380 [ 87.545982][ T1123] copy_net_ns+0x2a6/0x5f0 [ 87.550437][ T1123] create_new_namespaces+0x3ea/0xa90 [ 87.555756][ T1123] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 87.561410][ T1123] ksys_unshare+0x45b/0xa40 [ 87.565937][ T1123] page last free pid 2977 tgid 2977 stack trace: [ 87.572271][ T1123] __free_frozen_pages+0x78a/0xfd0 [ 87.577413][ T1123] __put_partials+0x165/0x1c0 [ 87.582116][ T1123] qlist_free_all+0x4d/0x120 [ 87.586725][ T1123] kasan_quarantine_reduce+0x195/0x1e0 [ 87.592232][ T1123] __kasan_slab_alloc+0x4e/0x70 [ 87.597105][ T1123] kmem_cache_alloc_noprof+0x14f/0x3b0 [ 87.602614][ T1123] getname_flags.part.0+0x4c/0x550 [ 87.607874][ T1123] getname_flags+0x93/0xf0 [ 87.612307][ T1123] __x64_sys_rename+0x58/0xa0 [ 87.617013][ T1123] do_syscall_64+0xcd/0x4d0 [ 87.621539][ T1123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.627454][ T1123] [ 87.629786][ T1123] Memory state around the buggy address: [ 87.635423][ T1123] ffff88811bc3d780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.643513][ T1123] ffff88811bc3d800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.651588][ T1123] >ffff88811bc3d880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.659662][ T1123] ^ [ 87.664617][ T1123] ffff88811bc3d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.672694][ T1123] ffff88811bc3d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 87.680857][ T1123] ================================================================== [ 87.689295][ T1123] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 87.696537][ T1123] CPU: 0 UID: 0 PID: 1123 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.706388][ T1123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 87.716487][ T1123] Workqueue: usb_hub_wq hub_event [ 87.721587][ T1123] Call Trace: [ 87.724892][ T1123] [ 87.727849][ T1123] dump_stack_lvl+0x3d/0x1f0 [ 87.732469][ T1123] vpanic+0x6e8/0x7a0 [ 87.736482][ T1123] ? __pfx_vpanic+0x10/0x10 [ 87.741014][ T1123] ? hdm_disconnect+0x227/0x250 [ 87.745891][ T1123] panic+0xca/0xd0 [ 87.749639][ T1123] ? __pfx_panic+0x10/0x10 [ 87.754091][ T1123] ? check_panic_on_warn+0x1f/0xb0 [ 87.759324][ T1123] check_panic_on_warn+0xab/0xb0 [ 87.764289][ T1123] end_report+0x107/0x170 [ 87.768689][ T1123] kasan_report+0xee/0x110 [ 87.773160][ T1123] ? hdm_disconnect+0x227/0x250 [ 87.778042][ T1123] hdm_disconnect+0x227/0x250 [ 87.782748][ T1123] usb_unbind_interface+0x1da/0x9e0 [ 87.787973][ T1123] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 87.794077][ T1123] ? __pfx_usb_unbind_interface+0x10/0x10 [ 87.799820][ T1123] device_remove+0x122/0x170 [ 87.804448][ T1123] device_release_driver_internal+0x44b/0x620 [ 87.810560][ T1123] bus_remove_device+0x22f/0x420 [ 87.815529][ T1123] device_del+0x396/0x9f0 [ 87.819925][ T1123] ? __pfx_device_del+0x10/0x10 [ 87.824808][ T1123] ? __pfx___mutex_lock+0x10/0x10 [ 87.829849][ T1123] ? __pfx___pm_runtime_barrier+0x10/0x10 [ 87.835602][ T1123] ? do_raw_spin_lock+0x12c/0x2b0 [ 87.840654][ T1123] usb_disable_device+0x355/0x7d0 [ 87.845712][ T1123] ? lockdep_hardirqs_on+0x7c/0x110 [ 87.850950][ T1123] usb_disconnect+0x2e1/0x9c0 [ 87.855663][ T1123] hub_event+0x1aa2/0x5060 [ 87.860124][ T1123] ? __lock_acquire+0xb97/0x1ce0 [ 87.865087][ T1123] ? __pfx_hub_event+0x10/0x10 [ 87.869886][ T1123] ? interval_tree_remove+0x850/0xee0 [ 87.875299][ T1123] ? rcu_is_watching+0x12/0xc0 [ 87.880113][ T1123] process_one_work+0x9cf/0x1b70 [ 87.885083][ T1123] ? __pfx_hub_event+0x10/0x10 [ 87.889886][ T1123] ? __pfx_process_one_work+0x10/0x10 [ 87.895291][ T1123] ? assign_work+0x1a0/0x250 [ 87.899916][ T1123] worker_thread+0x6c8/0xf10 [ 87.904535][ T1123] ? __kthread_parkme+0x19e/0x250 [ 87.909578][ T1123] ? __pfx_worker_thread+0x10/0x10 [ 87.914812][ T1123] kthread+0x3c5/0x780 [ 87.918909][ T1123] ? __pfx_kthread+0x10/0x10 [ 87.923522][ T1123] ? rcu_is_watching+0x12/0xc0 [ 87.928319][ T1123] ? __pfx_kthread+0x10/0x10 [ 87.932936][ T1123] ret_from_fork+0x56d/0x700 [ 87.937573][ T1123] ? __pfx_kthread+0x10/0x10 [ 87.942205][ T1123] ret_from_fork_asm+0x1a/0x30 [ 87.947103][ T1123] [ 87.950426][ T1123] Kernel Offset: disabled [ 87.954755][ T1123] Rebooting in 86400 seconds..