BUG: workqueue leaked atomic, lock or RCU: udevd[5190] preempt=0x00000101 lock=1->0 RCU=1->1 workfn=usb_giveback_urb_bh INFO: lockdep is turned off. CPU: 0 UID: 0 PID: 5190 Comm: udevd Not tainted 6.13.0-syzkaller-05474-g113691ce9f32 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120 process_one_work+0x11e6/0x1ba0 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3317 [inline] bh_worker+0x5a4/0x8a0 kernel/workqueue.c:3577 workqueue_softirq_action+0x12c/0x190 kernel/workqueue.c:3604 tasklet_hi_action+0x17/0x70 kernel/softirq.c:842 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0x31/0x80 kernel/locking/spinlock.c:194 Code: f5 53 48 8b 74 24 10 48 89 fb 48 83 c7 18 e8 e6 6d 3e f6 48 89 df e8 3e ed 3e f6 f7 c5 00 02 00 00 75 23 9c 58 f6 c4 02 75 37 01 00 00 00 e8 85 c3 2f f6 65 8b 05 96 82 ab 74 85 c0 74 16 5b RSP: 0018:ffffc90003b3f908 EFLAGS: 00000246 RAX: 0000000000000006 RBX: ffff88807d891e40 RCX: 1ffffffff20c4191 RDX: 0000000000000000 RSI: ffffffff8b6cd840 RDI: ffffffff8bd2ec20 RBP: 0000000000000282 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff90624fd7 R11: 0000000000000006 R12: ffff88802735e180 R13: ffff88807d891e40 R14: ffff88802735e550 R15: ffff888024be8dc0 sock_def_readable+0x15f/0x610 net/core/sock.c:3476 __netlink_sendskb net/netlink/af_netlink.c:1268 [inline] netlink_sendskb net/netlink/af_netlink.c:1274 [inline] netlink_unicast+0x6f1/0x7f0 net/netlink/af_netlink.c:1363 netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1892 sock_sendmsg_nosec net/socket.c:713 [inline] __sock_sendmsg net/socket.c:728 [inline] ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2568 ___sys_sendmsg+0x135/0x1e0 net/socket.c:2622 __sys_sendmsg+0x16e/0x220 net/socket.c:2654 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f4313724a4b Code: ff 89 ef 48 89 04 24 e8 22 56 f9 ff 48 8b 04 24 48 83 c4 20 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 20 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 6d 48 8b 15 ae c3 0c 00 f7 d8 64 89 02 48 83 RSP: 002b:00007ffd792cae28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000055a450bd2d90 RCX: 00007f4313724a4b RDX: 0000000000000000 RSI: 00007ffd792cae38 RDI: 0000000000000004 RBP: 000055a450c00200 R08: 0000000000000001 R09: fa1e497890b7bd95 R10: 000000000000010f R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000090 R14: 0000000000000000 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: f5 cmc 1: 53 push %rbx 2: 48 8b 74 24 10 mov 0x10(%rsp),%rsi 7: 48 89 fb mov %rdi,%rbx a: 48 83 c7 18 add $0x18,%rdi e: e8 e6 6d 3e f6 call 0xf63e6df9 13: 48 89 df mov %rbx,%rdi 16: e8 3e ed 3e f6 call 0xf63eed59 1b: f7 c5 00 02 00 00 test $0x200,%ebp 21: 75 23 jne 0x46 23: 9c pushf 24: 58 pop %rax 25: f6 c4 02 test $0x2,%ah 28: 75 37 jne 0x61 * 2a: bf 01 00 00 00 mov $0x1,%edi <-- trapping instruction 2f: e8 85 c3 2f f6 call 0xf62fc3b9 34: 65 8b 05 96 82 ab 74 mov %gs:0x74ab8296(%rip),%eax # 0x74ab82d1 3b: 85 c0 test %eax,%eax 3d: 74 16 je 0x55 3f: 5b pop %rbx