BUG: workqueue leaked atomic, lock or RCU: udevd[5190]
preempt=0x00000101 lock=1->0 RCU=1->1 workfn=usb_giveback_urb_bh
INFO: lockdep is turned off.
CPU: 0 UID: 0 PID: 5190 Comm: udevd Not tainted 6.13.0-syzkaller-05474-g113691ce9f32 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
process_one_work+0x11e6/0x1ba0 kernel/workqueue.c:3257
process_scheduled_works kernel/workqueue.c:3317 [inline]
bh_worker+0x5a4/0x8a0 kernel/workqueue.c:3577
workqueue_softirq_action+0x12c/0x190 kernel/workqueue.c:3604
tasklet_hi_action+0x17/0x70 kernel/softirq.c:842
handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
__do_softirq kernel/softirq.c:595 [inline]
invoke_softirq kernel/softirq.c:435 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0x31/0x80 kernel/locking/spinlock.c:194
Code: f5 53 48 8b 74 24 10 48 89 fb 48 83 c7 18 e8 e6 6d 3e f6 48 89 df e8 3e ed 3e f6 f7 c5 00 02 00 00 75 23 9c 58 f6 c4 02 75 37 01 00 00 00 e8 85 c3 2f f6 65 8b 05 96 82 ab 74 85 c0 74 16 5b
RSP: 0018:ffffc90003b3f908 EFLAGS: 00000246
RAX: 0000000000000006 RBX: ffff88807d891e40 RCX: 1ffffffff20c4191
RDX: 0000000000000000 RSI: ffffffff8b6cd840 RDI: ffffffff8bd2ec20
RBP: 0000000000000282 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff90624fd7 R11: 0000000000000006 R12: ffff88802735e180
R13: ffff88807d891e40 R14: ffff88802735e550 R15: ffff888024be8dc0
sock_def_readable+0x15f/0x610 net/core/sock.c:3476
__netlink_sendskb net/netlink/af_netlink.c:1268 [inline]
netlink_sendskb net/netlink/af_netlink.c:1274 [inline]
netlink_unicast+0x6f1/0x7f0 net/netlink/af_netlink.c:1363
netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1892
sock_sendmsg_nosec net/socket.c:713 [inline]
__sock_sendmsg net/socket.c:728 [inline]
____sys_sendmsg+0xaaf/0xc90 net/socket.c:2568
___sys_sendmsg+0x135/0x1e0 net/socket.c:2622
__sys_sendmsg+0x16e/0x220 net/socket.c:2654
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4313724a4b
Code: ff 89 ef 48 89 04 24 e8 22 56 f9 ff 48 8b 04 24 48 83 c4 20 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6d 48 8b 15 ae c3 0c 00 f7 d8 64 89 02 48 83
RSP: 002b:00007ffd792cae28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000055a450bd2d90 RCX: 00007f4313724a4b
RDX: 0000000000000000 RSI: 00007ffd792cae38 RDI: 0000000000000004
RBP: 000055a450c00200 R08: 0000000000000001 R09: fa1e497890b7bd95
R10: 000000000000010f R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000090 R14: 0000000000000000 R15: 0000000000000000
----------------
Code disassembly (best guess):
0: f5 cmc
1: 53 push %rbx
2: 48 8b 74 24 10 mov 0x10(%rsp),%rsi
7: 48 89 fb mov %rdi,%rbx
a: 48 83 c7 18 add $0x18,%rdi
e: e8 e6 6d 3e f6 call 0xf63e6df9
13: 48 89 df mov %rbx,%rdi
16: e8 3e ed 3e f6 call 0xf63eed59
1b: f7 c5 00 02 00 00 test $0x200,%ebp
21: 75 23 jne 0x46
23: 9c pushf
24: 58 pop %rax
25: f6 c4 02 test $0x2,%ah
28: 75 37 jne 0x61
* 2a: bf 01 00 00 00 mov $0x1,%edi <-- trapping instruction
2f: e8 85 c3 2f f6 call 0xf62fc3b9
34: 65 8b 05 96 82 ab 74 mov %gs:0x74ab8296(%rip),%eax # 0x74ab82d1
3b: 85 c0 test %eax,%eax
3d: 74 16 je 0x55
3f: 5b pop %rbx