------------[ cut here ]------------ URB ffff88807e2e7800 submitted while active WARNING: drivers/usb/core/urb.c:379 at usb_submit_urb+0x7b/0x18b0 drivers/usb/core/urb.c:379, CPU#1: usb-storage/6435 Modules linked in: CPU: 1 UID: 0 PID: 6435 Comm: usb-storage Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 RIP: 0010:usb_submit_urb+0x7e/0x18b0 drivers/usb/core/urb.c:379 Code: 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 37 45 f8 fa 49 83 3e 00 74 40 e8 ac f2 8d fa 48 8d 3d f5 37 e7 08 48 89 de <67> 48 0f b9 3a b8 f0 ff ff ff eb 11 e8 91 f2 8d fa eb 05 e8 8a f2 RSP: 0018:ffffc9000213f3a8 EFLAGS: 00010293 RAX: ffffffff8737e114 RBX: ffff88807e2e7800 RCX: ffff88803587db80 RDX: 0000000000000000 RSI: ffff88807e2e7800 RDI: ffffffff901f1910 RBP: ffffc9000213f568 R08: 0000000000000002 R09: 0000000000000000 R10: ffffc9000213f4a0 R11: fffff52000427e9f R12: 0000000000000c00 R13: ffff888020ed5058 R14: ffff88807e2e7808 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888125554000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffe340c4c00 CR3: 0000000031d6e000 CR4: 00000000003526f0 Call Trace: usb_stor_msg_common+0x2a2/0x500 drivers/usb/storage/transport.c:143 usb_stor_bulk_transfer_buf+0x155/0x7b0 drivers/usb/storage/transport.c:395 ene_send_scsi_cmd+0x119/0x610 drivers/usb/storage/ene_ub6250.c:502 ene_get_card_type drivers/usb/storage/ene_ub6250.c:1842 [inline] ene_init+0x14f/0x380 drivers/usb/storage/ene_ub6250.c:2196 ene_transport+0x3ac3/0x46e0 drivers/usb/storage/ene_ub6250.c:2309 usb_stor_invoke_transport+0x11d/0x1a50 drivers/usb/storage/transport.c:611 usb_stor_control_thread+0x44c/0x900 drivers/usb/storage/usb.c:462 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ---------------- Code disassembly (best guess): 0: 89 f0 mov %esi,%eax 2: 48 c1 e8 03 shr $0x3,%rax 6: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) b: 74 08 je 0x15 d: 4c 89 f7 mov %r14,%rdi 10: e8 37 45 f8 fa call 0xfaf8454c 15: 49 83 3e 00 cmpq $0x0,(%r14) 19: 74 40 je 0x5b 1b: e8 ac f2 8d fa call 0xfa8df2cc 20: 48 8d 3d f5 37 e7 08 lea 0x8e737f5(%rip),%rdi # 0x8e7381c 27: 48 89 de mov %rbx,%rsi * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: b8 f0 ff ff ff mov $0xfffffff0,%eax 34: eb 11 jmp 0x47 36: e8 91 f2 8d fa call 0xfa8df2cc 3b: eb 05 jmp 0x42 3d: e8 .byte 0xe8 3e: 8a f2 mov %dl,%dh