------------[ cut here ]------------ URB ffff888031b76100 submitted while active WARNING: drivers/usb/core/urb.c:380 at usb_submit_urb+0x7b/0x18b0 drivers/usb/core/urb.c:380, CPU#1: kworker/1:2/991 Modules linked in: CPU: 1 UID: 0 PID: 991 Comm: kworker/1:2 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events wdm_rxwork RIP: 0010:usb_submit_urb+0x7e/0x18b0 drivers/usb/core/urb.c:380 Code: 89 f0 48 c1 e8 03 42 80 3c 38 00 74 08 4c 89 f7 e8 47 32 83 fb 49 83 3e 00 74 40 e8 cc 18 1e fb 48 8d 3d b5 35 b0 08 48 89 de <67> 48 0f b9 3a b8 f0 ff ff ff eb 11 e8 b1 18 1e fb eb 05 e8 aa 18 RSP: 0018:ffffc900043dfa30 EFLAGS: 00010293 RAX: ffffffff86a4fcb4 RBX: ffff888031b76100 RCX: ffff8880266e3c00 RDX: 0000000000000000 RSI: ffff888031b76100 RDI: ffffffff8f553270 RBP: ffffc900043dfc01 R08: ffffffff8f492877 R09: 1ffffffff1e9250e R10: dffffc0000000000 R11: fffffbfff1e9250f R12: 0000000000000cc0 R13: 1ffff1100816b51a R14: ffff888031b76108 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888126695000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000026000 CR3: 000000000d9ba000 CR4: 00000000003526f0 DR0: ffffffffffffffff DR1: 00000000000001f8 DR2: 0000000000080083 DR3: ffffffffefffff16 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: wdm_rxwork+0xf7/0x1c0 drivers/usb/class/cdc-wdm.c:995 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xaec/0x17a0 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ---------------- Code disassembly (best guess): 0: 89 f0 mov %esi,%eax 2: 48 c1 e8 03 shr $0x3,%rax 6: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) b: 74 08 je 0x15 d: 4c 89 f7 mov %r14,%rdi 10: e8 47 32 83 fb call 0xfb83325c 15: 49 83 3e 00 cmpq $0x0,(%r14) 19: 74 40 je 0x5b 1b: e8 cc 18 1e fb call 0xfb1e18ec 20: 48 8d 3d b5 35 b0 08 lea 0x8b035b5(%rip),%rdi # 0x8b035dc 27: 48 89 de mov %rbx,%rsi * 2a: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2f: b8 f0 ff ff ff mov $0xfffffff0,%eax 34: eb 11 jmp 0x47 36: e8 b1 18 1e fb call 0xfb1e18ec 3b: eb 05 jmp 0x42 3d: e8 .byte 0xe8 3e: aa stos %al,%es:(%rdi) 3f: 18 .byte 0x18