Unable to handle kernel execute from non-executable memory at virtual address ffff0000cd0c1d00 KASAN: maybe wild-memory-access in range [0xfffc00066860e800-0xfffc00066860e807] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001ac439000 [ffff0000cd0c1d00] pgd=0000000000000000, p4d=180000023ffff003, pud=180000023f41b003, pmd=180000023f3b2003, pte=006800010d0c1707 Internal error: Oops: 000000008600000f [#1] PREEMPT SMP Modules linked in: CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.11.0-rc4-syzkaller-gbe6d853c7631 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000cd0c1d00 lr : smc_fback_forward_wakeup+0x1dc/0x514 net/smc/af_smc.c:822 sp : ffff8000800176c0 x29: ffff800080017790 x28: 1fffe0001b15cae8 x27: ffff8000800176e0 x26: dfff800000000000 x25: ffff700010002edc x24: ffff800080017710 x23: ffff0000d8ae5740 x22: ffff0000d8ae55c0 x21: ffff0000cd0c1d00 x20: ffff800080017700 x19: ffff0000eed9b040 x18: ffff800080017320 x17: 00000000000322c5 x16: ffff80008029a590 x15: 0000000000000001 x14: 1fffe0001ddb3608 x13: 0000000000000000 x12: 0000000000000003 x11: 0000000000000304 x10: 0000000000000000 x9 : 1fffe00018370001 x8 : 0000000100000303 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000020 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000003 x1 : ffff80008b462a00 x0 : ffff0000d8ae55c0 Call trace: 0xffff0000cd0c1d00 smc_fback_write_space+0x88/0xac net/smc/af_smc.c:862 tcp_new_space net/ipv4/tcp_input.c:5680 [inline] tcp_check_space+0x150/0x834 net/ipv4/tcp_input.c:5699 tcp_event_new_data_sent+0x2c8/0x418 net/ipv4/tcp_output.c:87 tcp_write_xmit+0x142c/0x5220 net/ipv4/tcp_output.c:2836 tcp_send_loss_probe+0x1b4/0x7e8 net/ipv4/tcp_output.c:2952 tcp_write_timer_handler+0x2bc/0x7d8 net/ipv4/tcp_timer.c:700 tcp_write_timer+0x170/0x2e4 net/ipv4/tcp_timer.c:721 call_timer_fn+0x1b4/0x8e8 kernel/time/timer.c:1792 expire_timers kernel/time/timer.c:1843 [inline] __run_timers kernel/time/timer.c:2417 [inline] __run_timer_base+0x56c/0x7b4 kernel/time/timer.c:2428 run_timer_base kernel/time/timer.c:2437 [inline] run_timer_softirq+0xcc/0x194 kernel/time/timer.c:2447 handle_softirqs+0x2e4/0xbfc kernel/softirq.c:554 __do_softirq+0x14/0x20 kernel/softirq.c:588 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:637 irq_exit_rcu+0x14/0x84 kernel/softirq.c:649 __el1_irq arch/arm64/kernel/entry-common.c:537 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:551 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:556 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:48 cpuidle_idle_call kernel/sched/idle.c:185 [inline] do_idle+0x1f0/0x4e4 kernel/sched/idle.c:326 cpu_startup_entry+0x5c/0x74 kernel/sched/idle.c:424 secondary_start_kernel+0x1bc/0x1e4 arch/arm64/kernel/smp.c:279 __secondary_switched+0xb8/0xbc arch/arm64/kernel/head.S:417 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---