netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 Unable to handle kernel execute from non-executable memory at virtual address ffff0000c5cf7400 KASAN: maybe wild-memory-access in range [0xfffc00062e7ba000-0xfffc00062e7ba007] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000002079f8000 [ffff0000c5cf7400] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f41b403, pmd=180000023f3ec403, pte=0068000105cf7707 Internal error: Oops: 000000008600000f [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 6493 Comm: syz-executor337 Not tainted 6.15.0-rc6-syzkaller-ga82e92598ab1 #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000c5cf7400 lr : smc_fback_forward_wakeup+0x1bc/0x4ac net/smc/af_smc.c:828 sp : ffff8000a12575e0 x29: ffff8000a1257690 x28: ffff0000ddb8aa40 x27: 1fffe00019816030 x26: ffff8000a12575e0 x25: dfff800000000000 x24: ffff70001424aebc x23: 0000000000000001 x22: ffff0000cc0b0180 x21: ffff0000cc0b0000 x20: ffff0000c5cf7400 x19: ffff0000cc0a0000 x18: 00000000ffffffff x17: ffff800092f36000 x16: ffff80008051c2cc x15: 0000000000000001 x14: 1fffe0001bb71548 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800092d35c40 x10: 0000000000000202 x9 : dfff800000000000 x8 : 0000000100000201 x7 : ffff8000804f5b1c x6 : 0000000000000000 x5 : 0000000000000020 x4 : ffff8000a1257320 x3 : 0000000000000010 x2 : 0000000000000003 x1 : ffff80008e9036c1 x0 : ffff0000cc0b0000 Call trace: 0xffff0000c5cf7400 (P) smc_fback_data_ready+0x84/0xa8 net/smc/af_smc.c:856 tcp_urg+0x240/0x32c net/ipv4/tcp_input.c:5950 tcp_rcv_established+0xd34/0x1cc0 net/ipv4/tcp_input.c:6309 tcp_v4_do_rcv+0x3c0/0xbc4 net/ipv4/tcp_ipv4.c:1925 sk_backlog_rcv include/net/sock.h:1132 [inline] __release_sock+0x19c/0x39c net/core/sock.c:3163 release_sock+0x60/0x1ac net/core/sock.c:3717 tcp_sendmsg+0x4c/0x64 net/ipv4/tcp.c:1367 inet_sendmsg+0x154/0x284 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] __sys_sendto+0x36c/0x4f4 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2183 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---