------------[ cut here ]------------ URB ffff88811735fb00 submitted while active WARNING: drivers/usb/core/urb.c:380 at usb_submit_urb+0x15fa/0x1910 drivers/usb/core/urb.c:380, CPU#1: kworker/1:7/7542 Modules linked in: CPU: 1 UID: 0 PID: 7542 Comm: kworker/1:7 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events wdm_rxwork RIP: 0010:usb_submit_urb+0x15fd/0x1910 drivers/usb/core/urb.c:380 Code: 00 48 8b 04 24 48 8b 90 b0 00 00 00 e9 73 ff ff ff bb ed ff ff ff e9 be f2 ff ff e8 0d b0 ca fc 48 8d 3d e6 1d 0f 06 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 a0 f2 ff ff c7 44 24 30 00 00 00 RSP: 0018:ffffc9001505fba0 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff88811735fb00 RCX: ffffffff8514f049 RDX: ffff88813a3f1d00 RSI: ffff88811735fb00 RDI: ffffffff8af62480 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000293 R13: ffff888115b66890 R14: ffff888115b66850 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8882687d3000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557f05ae4300 CR3: 0000000116dce000 CR4: 00000000003506f0 Call Trace: wdm_rxwork+0xf8/0x200 drivers/usb/class/cdc-wdm.c:995 process_one_work+0x9d7/0x1920 kernel/workqueue.c:3275 process_scheduled_works kernel/workqueue.c:3358 [inline] worker_thread+0x5da/0xe40 kernel/workqueue.c:3439 kthread+0x370/0x450 kernel/kthread.c:467 ret_from_fork+0x6c3/0xcb0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ---------------- Code disassembly (best guess): 0: 00 48 8b add %cl,-0x75(%rax) 3: 04 24 add $0x24,%al 5: 48 8b 90 b0 00 00 00 mov 0xb0(%rax),%rdx c: e9 73 ff ff ff jmp 0xffffff84 11: bb ed ff ff ff mov $0xffffffed,%ebx 16: e9 be f2 ff ff jmp 0xfffff2d9 1b: e8 0d b0 ca fc call 0xfccab02d 20: 48 8d 3d e6 1d 0f 06 lea 0x60f1de6(%rip),%rdi # 0x60f1e0d 27: 48 89 de mov %rbx,%rsi * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: bb f0 ff ff ff mov $0xfffffff0,%ebx 34: e9 a0 f2 ff ff jmp 0xfffff2d9 39: c7 .byte 0xc7 3a: 44 24 30 rex.R and $0x30,%al 3d: 00 00 add %al,(%rax)