Warning: Permanently added '10.128.1.85' (ED25519) to the list of known hosts.
2025/07/03 18:03:17 ignoring optional flag "sandboxArg"="0"
2025/07/03 18:03:18 parsed 1 programs
[ 48.095128][ T29] audit: type=1400 audit(1751565798.654:61): avc: denied { node_bind } for pid=2954 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 50.681838][ T29] audit: type=1400 audit(1751565801.244:62): avc: denied { mounton } for pid=2962 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 50.687330][ T2962] cgroup: Unknown subsys name 'net'
[ 50.704675][ T29] audit: type=1400 audit(1751565801.244:63): avc: denied { mount } for pid=2962 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.732226][ T29] audit: type=1400 audit(1751565801.274:64): avc: denied { unmount } for pid=2962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 50.890912][ T2962] cgroup: Unknown subsys name 'cpuset'
[ 50.899691][ T2962] cgroup: Unknown subsys name 'rlimit'
[ 51.078947][ T29] audit: type=1400 audit(1751565801.644:65): avc: denied { setattr } for pid=2962 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 51.102460][ T29] audit: type=1400 audit(1751565801.644:66): avc: denied { create } for pid=2962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.123044][ T29] audit: type=1400 audit(1751565801.644:67): avc: denied { write } for pid=2962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.143496][ T29] audit: type=1400 audit(1751565801.644:68): avc: denied { read } for pid=2962 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 51.163865][ T29] audit: type=1400 audit(1751565801.644:69): avc: denied { module_request } for pid=2962 comm="syz-executor" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[ 51.186588][ T29] audit: type=1400 audit(1751565801.694:70): avc: denied { sys_module } for pid=2962 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 51.273222][ T2967] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped).
[ 51.354471][ T2962] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k
[ 53.007060][ T2969] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[ 53.189524][ T29] kauditd_printk_skb: 18 callbacks suppressed
[ 53.189547][ T29] audit: type=1400 audit(1751565803.754:89): avc: denied { read write } for pid=2969 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 53.219907][ T29] audit: type=1400 audit(1751565803.754:90): avc: denied { open } for pid=2969 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 53.247503][ T29] audit: type=1400 audit(1751565803.754:91): avc: denied { ioctl } for pid=2969 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 57.216863][ T29] audit: type=1400 audit(1751565807.774:92): avc: denied { create } for pid=2992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 57.239724][ T29] audit: type=1400 audit(1751565807.774:93): avc: denied { write } for pid=2992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 57.270533][ T29] audit: type=1400 audit(1751565807.834:94): avc: denied { read } for pid=2992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 68.352124][ T2992] syz-executor (2992) used greatest stack depth: 22680 bytes left
[ 68.945473][ T29] audit: type=1400 audit(1751565819.504:95): avc: denied { create } for pid=3460 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1
[ 68.965789][ T29] audit: type=1400 audit(1751565819.524:96): avc: denied { sys_admin } for pid=3460 comm="syz-executor" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 69.043062][ T29] audit: type=1400 audit(1751565819.604:97): avc: denied { sys_chroot } for pid=3461 comm="syz-executor" capability=18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1
[ 70.934340][ T29] audit: type=1400 audit(1751565821.494:98): avc: denied { create } for pid=3505 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[ 72.030669][ T29] audit: type=1401 audit(1751565822.594:99): op=setxattr invalid_context="u:object_r:app_data_file:s0:c512,c768"
2025/07/03 18:03:43 executed programs: 0
[ 72.557372][ T29] audit: type=1400 audit(1751565823.114:100): avc: denied { write } for pid=2954 comm="syz-execprog" path="pipe:[1445]" dev="pipefs" ino=1445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
2025/07/03 18:03:57 executed programs: 2
[ 87.305455][ T29] audit: type=1400 audit(1751565837.864:101): avc: denied { read write } for pid=3989 comm="syz.3.16" name="raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.329255][ T29] audit: type=1400 audit(1751565837.864:102): avc: denied { open } for pid=3989 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.353397][ T29] audit: type=1400 audit(1751565837.894:103): avc: denied { ioctl } for pid=3989 comm="syz.3.16" path="/dev/raw-gadget" dev="devtmpfs" ino=236 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 87.568515][ T38] usb 4-1: new high-speed USB device number 2 using dummy_hcd
[ 87.718405][ T38] usb 4-1: Using ep0 maxpacket: 8
[ 87.726165][ T38] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.734586][ T38] usb 4-1: config 162 has an invalid interface number: 3 but max is 2
[ 87.742919][ T38] usb 4-1: config 162 has 2 interfaces, different from the descriptor's value: 3
[ 87.752134][ T38] usb 4-1: config 162 has no interface number 0
[ 87.758469][ T38] usb 4-1: config 162 has no interface number 1
[ 87.764843][ T38] usb 4-1: config 162 interface 3 altsetting 2 has 1 endpoint descriptor, different from the interface descriptor's value: 3
[ 87.777898][ T38] usb 4-1: config 162 interface 2 altsetting 1 has a duplicate endpoint with address 0x9, skipping
[ 87.788705][ T38] usb 4-1: config 162 interface 2 altsetting 1 has an endpoint descriptor with address 0xA6, changing to 0x86
[ 87.800539][ T38] usb 4-1: config 162 interface 2 altsetting 1 endpoint 0x86 has invalid maxpacket 23105, setting to 1024
[ 87.811930][ T38] usb 4-1: config 162 interface 2 altsetting 1 bulk endpoint 0x86 has invalid maxpacket 1024
[ 87.822219][ T38] usb 4-1: config 162 interface 2 altsetting 1 has 5 endpoint descriptors, different from the interface descriptor's value: 4
[ 87.835344][ T38] usb 4-1: config 162 interface 3 has no altsetting 0
[ 87.842200][ T38] usb 4-1: config 162 interface 3 has no altsetting 1
[ 87.849089][ T38] usb 4-1: config 162 interface 2 has no altsetting 0
[ 87.858262][ T38] usb 4-1: New USB device found, idVendor=0e8d, idProduct=763f, bcdDevice=9b.23
[ 87.867357][ T38] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 87.875458][ T38] usb 4-1: Product: syz
[ 87.879700][ T38] usb 4-1: Manufacturer: syz
[ 87.884330][ T38] usb 4-1: SerialNumber: syz
[ 88.125450][ T3993] Bluetooth: hci0: Opcode 0x0c03 failed: -71
[ 88.126052][ T38] usb 4-1: USB disconnect, device number 2
[ 88.142816][ T38] ==================================================================
[ 88.150933][ T38] BUG: KASAN: slab-use-after-free in btusb_disconnect+0x4dc/0x580
[ 88.158780][ T38] Read of size 4 at addr ffff8881066d97c0 by task kworker/1:1/38
[ 88.166598][ T38]
[ 88.168994][ T38] CPU: 1 UID: 0 PID: 38 Comm: kworker/1:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 88.169024][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 88.169041][ T38] Workqueue: usb_hub_wq hub_event
[ 88.169068][ T38] Call Trace:
[ 88.169078][ T38]
[ 88.169087][ T38] dump_stack_lvl+0x116/0x1f0
[ 88.169128][ T38] print_report+0xcd/0x680
[ 88.169154][ T38] ? __virt_addr_valid+0x81/0x610
[ 88.169182][ T38] ? __phys_addr+0xe8/0x180
[ 88.169213][ T38] ? btusb_disconnect+0x4dc/0x580
[ 88.169236][ T38] kasan_report+0xe0/0x110
[ 88.169265][ T38] ? btusb_disconnect+0x4dc/0x580
[ 88.169291][ T38] btusb_disconnect+0x4dc/0x580
[ 88.169316][ T38] usb_unbind_interface+0x1da/0x9a0
[ 88.169351][ T38] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 88.169386][ T38] ? __pfx_usb_unbind_interface+0x10/0x10
[ 88.169412][ T38] device_remove+0x122/0x170
[ 88.169439][ T38] device_release_driver_internal+0x44b/0x620
[ 88.169472][ T38] bus_remove_device+0x22f/0x420
[ 88.169496][ T38] device_del+0x396/0x9f0
[ 88.169523][ T38] ? __pfx_device_del+0x10/0x10
[ 88.169548][ T38] ? kobject_put+0x210/0x5a0
[ 88.169573][ T38] usb_disable_device+0x355/0x7d0
[ 88.169614][ T38] usb_disconnect+0x2e1/0x920
[ 88.169653][ T38] hub_event+0x1aa0/0x5030
[ 88.169684][ T38] ? __lock_acquire+0xb8a/0x1c90
[ 88.169707][ T38] ? __pfx_hub_event+0x10/0x10
[ 88.169727][ T38] ? assoc_array_gc+0xe00/0x15b0
[ 88.169754][ T38] ? rcu_is_watching+0x12/0xc0
[ 88.169787][ T38] process_one_work+0x9cc/0x1b70
[ 88.169818][ T38] ? __pfx_hub_event+0x10/0x10
[ 88.169839][ T38] ? __pfx_process_one_work+0x10/0x10
[ 88.169870][ T38] ? assign_work+0x1a0/0x250
[ 88.169895][ T38] worker_thread+0x6c8/0xf10
[ 88.169926][ T38] ? __kthread_parkme+0x19e/0x250
[ 88.169961][ T38] ? __pfx_worker_thread+0x10/0x10
[ 88.169988][ T38] kthread+0x3c5/0x780
[ 88.170012][ T38] ? __pfx_kthread+0x10/0x10
[ 88.170037][ T38] ? rcu_is_watching+0x12/0xc0
[ 88.170066][ T38] ? __pfx_kthread+0x10/0x10
[ 88.170091][ T38] ret_from_fork+0x5b3/0x6c0
[ 88.170125][ T38] ? __pfx_kthread+0x10/0x10
[ 88.170149][ T38] ret_from_fork_asm+0x1a/0x30
[ 88.170184][ T38]
[ 88.170192][ T38]
[ 88.392737][ T38] Allocated by task 38:
[ 88.396902][ T38] kasan_save_stack+0x33/0x60
[ 88.401596][ T38] kasan_save_track+0x14/0x30
[ 88.406295][ T38] __kasan_kmalloc+0x8f/0xa0
[ 88.410900][ T38] __kmalloc_node_track_caller_noprof+0x212/0x4c0
[ 88.417342][ T38] devm_kmalloc+0xa5/0x260
[ 88.421780][ T38] btusb_probe+0x23f/0x4480
[ 88.426301][ T38] usb_probe_interface+0x300/0x9c0
[ 88.431430][ T38] really_probe+0x241/0xa90
[ 88.435967][ T38] __driver_probe_device+0x1de/0x440
[ 88.441267][ T38] driver_probe_device+0x4c/0x1b0
[ 88.446308][ T38] __device_attach_driver+0x1df/0x310
[ 88.451694][ T38] bus_for_each_drv+0x159/0x1e0
[ 88.456569][ T38] __device_attach+0x1e4/0x4b0
[ 88.461350][ T38] bus_probe_device+0x17f/0x1c0
[ 88.466211][ T38] device_add+0x1148/0x1a70
[ 88.470735][ T38] usb_set_configuration+0x1187/0x1e20
[ 88.476209][ T38] usb_generic_driver_probe+0xb1/0x110
[ 88.481687][ T38] usb_probe_device+0xec/0x3e0
[ 88.486459][ T38] really_probe+0x241/0xa90
[ 88.490979][ T38] __driver_probe_device+0x1de/0x440
[ 88.496276][ T38] driver_probe_device+0x4c/0x1b0
[ 88.501316][ T38] __device_attach_driver+0x1df/0x310
[ 88.506704][ T38] bus_for_each_drv+0x159/0x1e0
[ 88.511581][ T38] __device_attach+0x1e4/0x4b0
[ 88.516379][ T38] bus_probe_device+0x17f/0x1c0
[ 88.521252][ T38] device_add+0x1148/0x1a70
[ 88.525797][ T38] usb_new_device+0xd07/0x1a20
[ 88.530582][ T38] hub_event+0x2f85/0x5030
[ 88.535012][ T38] process_one_work+0x9cc/0x1b70
[ 88.539969][ T38] worker_thread+0x6c8/0xf10
[ 88.544575][ T38] kthread+0x3c5/0x780
[ 88.548657][ T38] ret_from_fork+0x5b3/0x6c0
[ 88.553274][ T38] ret_from_fork_asm+0x1a/0x30
[ 88.558066][ T38]
[ 88.560398][ T38] Freed by task 38:
[ 88.564218][ T38] kasan_save_stack+0x33/0x60
[ 88.568910][ T38] kasan_save_track+0x14/0x30
[ 88.573598][ T38] kasan_save_free_info+0x3b/0x60
[ 88.578646][ T38] __kasan_slab_free+0x37/0x50
[ 88.583421][ T38] kfree+0x283/0x470
[ 88.587335][ T38] release_nodes+0x11e/0x240
[ 88.592028][ T38] devres_release_all+0x112/0x180
[ 88.597077][ T38] device_unbind_cleanup+0x19/0x1b0
[ 88.602312][ T38] device_release_driver_internal+0x4c3/0x620
[ 88.608423][ T38] usb_driver_release_interface+0x109/0x190
[ 88.614354][ T38] btusb_disconnect+0x448/0x580
[ 88.619239][ T38] usb_unbind_interface+0x1da/0x9a0
[ 88.624472][ T38] device_remove+0x122/0x170
[ 88.629089][ T38] device_release_driver_internal+0x44b/0x620
[ 88.635189][ T38] bus_remove_device+0x22f/0x420
[ 88.640241][ T38] device_del+0x396/0x9f0
[ 88.644617][ T38] usb_disable_device+0x355/0x7d0
[ 88.649703][ T38] usb_disconnect+0x2e1/0x920
[ 88.654429][ T38] hub_event+0x1aa0/0x5030
[ 88.658870][ T38] process_one_work+0x9cc/0x1b70
[ 88.663881][ T38] worker_thread+0x6c8/0xf10
[ 88.668517][ T38] kthread+0x3c5/0x780
[ 88.672624][ T38] ret_from_fork+0x5b3/0x6c0
[ 88.677258][ T38] ret_from_fork_asm+0x1a/0x30
[ 88.682056][ T38]
[ 88.684403][ T38] The buggy address belongs to the object at ffff8881066d9000
[ 88.684403][ T38] which belongs to the cache kmalloc-2k of size 2048
[ 88.698483][ T38] The buggy address is located 1984 bytes inside of
[ 88.698483][ T38] freed 2048-byte region [ffff8881066d9000, ffff8881066d9800)
[ 88.712478][ T38]
[ 88.714821][ T38] The buggy address belongs to the physical page:
[ 88.721256][ T38] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d8
[ 88.730141][ T38] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 88.738665][ T38] anon flags: 0x200000000000040(head|node=0|zone=2)
[ 88.745281][ T38] page_type: f5(slab)
[ 88.749294][ T38] raw: 0200000000000040 ffff888100042000 0000000000000000 dead000000000001
[ 88.757913][ T38] raw: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.766533][ T38] head: 0200000000000040 ffff888100042000 0000000000000000 dead000000000001
[ 88.775227][ T38] head: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
[ 88.783926][ T38] head: 0200000000000003 ffffea000419b601 00000000ffffffff 00000000ffffffff
[ 88.792625][ T38] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000008
[ 88.801336][ T38] page dumped because: kasan: bad access detected
[ 88.807768][ T38] page_owner tracks the page as allocated
[ 88.813503][ T38] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 3175974622, free_ts 0
[ 88.833173][ T38] post_alloc_hook+0x1c0/0x230
[ 88.837971][ T38] get_page_from_freelist+0xf98/0x2ce0
[ 88.843471][ T38] __alloc_frozen_pages_noprof+0x259/0x21e0
[ 88.849403][ T38] alloc_pages_mpol+0xe4/0x410
[ 88.854202][ T38] new_slab+0x23b/0x330
[ 88.858391][ T38] ___slab_alloc+0xda5/0x1940
[ 88.863125][ T38] __slab_alloc.constprop.0+0x56/0xb0
[ 88.868532][ T38] __kmalloc_cache_noprof+0x209/0x3c0
[ 88.873940][ T38] acpi_ds_create_walk_state+0x78/0x250
[ 88.879515][ T38] acpi_ds_call_control_method+0xee/0x700
[ 88.885296][ T38] acpi_ps_parse_aml+0x845/0xcb0
[ 88.890262][ T38] acpi_ps_execute_method+0x55a/0xb30
[ 88.895687][ T38] acpi_ns_evaluate+0x76c/0xca0
[ 88.900565][ T38] acpi_evaluate_object+0x1fa/0xa90
[ 88.905804][ T38] acpi_evaluate_integer+0xdd/0x200
[ 88.911042][ T38] acpi_bus_get_status+0x1a0/0x420
[ 88.916196][ T38] page_owner free stack trace missing
[ 88.921581][ T38]
[ 88.923922][ T38] Memory state around the buggy address:
[ 88.929569][ T38] ffff8881066d9680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.937649][ T38] ffff8881066d9700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.945730][ T38] >ffff8881066d9780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 88.953810][ T38] ^
[ 88.959977][ T38] ffff8881066d9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 88.968073][ T38] ffff8881066d9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 88.976153][ T38] ==================================================================
[ 88.984733][ T38] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 88.991985][ T38] CPU: 1 UID: 0 PID: 38 Comm: kworker/1:1 Not tainted 6.16.0-rc2-syzkaller-00053-gcf16f408364e #0 PREEMPT(voluntary)
[ 89.004369][ T38] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 89.014474][ T38] Workqueue: usb_hub_wq hub_event
[ 89.019565][ T38] Call Trace:
[ 89.022900][ T38]
[ 89.025874][ T38] dump_stack_lvl+0x3d/0x1f0
[ 89.030565][ T38] panic+0x71c/0x800
[ 89.034518][ T38] ? __pfx_panic+0x10/0x10
[ 89.038981][ T38] ? mark_held_locks+0x49/0x80
[ 89.043777][ T38] ? btusb_disconnect+0x4dc/0x580
[ 89.048837][ T38] ? check_panic_on_warn+0x1f/0xb0
[ 89.053981][ T38] ? btusb_disconnect+0x4dc/0x580
[ 89.059038][ T38] check_panic_on_warn+0xab/0xb0
[ 89.064011][ T38] end_report+0x107/0x170
[ 89.068386][ T38] kasan_report+0xee/0x110
[ 89.072851][ T38] ? btusb_disconnect+0x4dc/0x580
[ 89.077912][ T38] btusb_disconnect+0x4dc/0x580
[ 89.082799][ T38] usb_unbind_interface+0x1da/0x9a0
[ 89.088035][ T38] ? kernfs_remove_by_name_ns+0xbe/0x110
[ 89.093801][ T38] ? __pfx_usb_unbind_interface+0x10/0x10
[ 89.099555][ T38] device_remove+0x122/0x170
[ 89.104189][ T38] device_release_driver_internal+0x44b/0x620
[ 89.110649][ T38] bus_remove_device+0x22f/0x420
[ 89.115628][ T38] device_del+0x396/0x9f0
[ 89.119998][ T38] ? __pfx_device_del+0x10/0x10
[ 89.124885][ T38] ? kobject_put+0x210/0x5a0
[ 89.129509][ T38] usb_disable_device+0x355/0x7d0
[ 89.134586][ T38] usb_disconnect+0x2e1/0x920
[ 89.139318][ T38] hub_event+0x1aa0/0x5030
[ 89.143779][ T38] ? __lock_acquire+0xb8a/0x1c90
[ 89.148747][ T38] ? __pfx_hub_event+0x10/0x10
[ 89.153547][ T38] ? assoc_array_gc+0xe00/0x15b0
[ 89.158547][ T38] ? rcu_is_watching+0x12/0xc0
[ 89.163362][ T38] process_one_work+0x9cc/0x1b70
[ 89.168344][ T38] ? __pfx_hub_event+0x10/0x10
[ 89.173167][ T38] ? __pfx_process_one_work+0x10/0x10
[ 89.178583][ T38] ? assign_work+0x1a0/0x250
[ 89.183209][ T38] worker_thread+0x6c8/0xf10
[ 89.187843][ T38] ? __kthread_parkme+0x19e/0x250
[ 89.192916][ T38] ? __pfx_worker_thread+0x10/0x10
[ 89.198062][ T38] kthread+0x3c5/0x780
[ 89.202168][ T38] ? __pfx_kthread+0x10/0x10
[ 89.206788][ T38] ? rcu_is_watching+0x12/0xc0
[ 89.211612][ T38] ? __pfx_kthread+0x10/0x10
[ 89.216241][ T38] ret_from_fork+0x5b3/0x6c0
[ 89.220881][ T38] ? __pfx_kthread+0x10/0x10
[ 89.225517][ T38] ret_from_fork_asm+0x1a/0x30
[ 89.230330][ T38]
[ 89.233486][ T38] Kernel Offset: disabled
[ 89.237843][ T38] Rebooting in 86400 seconds..