------------[ cut here ]------------ URB ffff888106b1cb00 submitted while active WARNING: drivers/usb/core/urb.c:380 at usb_submit_urb+0x15a0/0x1970 drivers/usb/core/urb.c:380, CPU#1: usb-storage/4977 Modules linked in: CPU: 1 UID: 0 PID: 4977 Comm: usb-storage Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:usb_submit_urb+0x15a3/0x1970 drivers/usb/core/urb.c:380 Code: 4b 03 00 00 48 8b 04 24 48 8b 90 b0 00 00 00 eb 91 bb ed ff ff ff e9 07 f3 ff ff e8 f7 d6 c5 fc 48 8d 3d 40 29 f0 05 48 89 de <67> 48 0f b9 3a bb f0 ff ff ff e9 e9 f2 ff ff e8 d9 d6 c5 fc 0f 1f RSP: 0018:ffffc9000174f680 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff888106b1cb00 RCX: dffffc0000000000 RDX: ffff888121bb9d40 RSI: ffff888106b1cb00 RDI: ffffffff8aaa41c0 RBP: 1ffff920002e9ee3 R08: 0000000000000002 R09: 0000000000000000 R10: 0000000000000000 R11: ffff888121bba7e8 R12: ffff888117610ed8 R13: ffff888117610e50 R14: ffffc9000174f738 R15: ffff888106b1cb00 FS: 0000000000000000(0000) GS:ffff888268cf4000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005588c2d596c0 CR3: 00000001282a2000 CR4: 00000000003506f0 Call Trace: usb_stor_msg_common+0x23f/0x560 drivers/usb/storage/transport.c:143 usb_stor_bulk_transfer_buf+0x17c/0x410 drivers/usb/storage/transport.c:395 ene_send_scsi_cmd+0x130/0x610 drivers/usb/storage/ene_ub6250.c:502 ene_init drivers/usb/storage/ene_ub6250.c:2197 [inline] ene_transport+0x13fd/0x37f0 drivers/usb/storage/ene_ub6250.c:2310 usb_stor_invoke_transport+0xee/0x1570 drivers/usb/storage/transport.c:611 usb_stor_control_thread+0x5eb/0xb00 drivers/usb/storage/usb.c:462 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x74f/0xa30 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 ---------------- Code disassembly (best guess): 0: 4b 03 00 rex.WXB add (%r8),%rax 3: 00 48 8b add %cl,-0x75(%rax) 6: 04 24 add $0x24,%al 8: 48 8b 90 b0 00 00 00 mov 0xb0(%rax),%rdx f: eb 91 jmp 0xffffffa2 11: bb ed ff ff ff mov $0xffffffed,%ebx 16: e9 07 f3 ff ff jmp 0xfffff322 1b: e8 f7 d6 c5 fc call 0xfcc5d717 20: 48 8d 3d 40 29 f0 05 lea 0x5f02940(%rip),%rdi # 0x5f02967 27: 48 89 de mov %rbx,%rsi * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: bb f0 ff ff ff mov $0xfffffff0,%ebx 34: e9 e9 f2 ff ff jmp 0xfffff322 39: e8 d9 d6 c5 fc call 0xfcc5d717 3e: 0f .byte 0xf 3f: 1f (bad)