Unable to handle kernel execute from non-executable memory at virtual address ffff0000c7d10d80 KASAN: maybe wild-memory-access in range [0xfffc00063e886c00-0xfffc00063e886c07] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001a50b0000 [ffff0000c7d10d80] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f41b403, pmd=180000023f3dc403, pte=0068000107d10707 Internal error: Oops: 000000008600000f [#1] PREEMPT SMP Modules linked in: CPU: 0 UID: 0 PID: 7213 Comm: syz.1.156 Not tainted 6.14.0-rc1-syzkaller-g2014c95afece #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000c7d10d80 lr : smc_fback_forward_wakeup+0x1dc/0x514 net/smc/af_smc.c:823 sp : ffff8000a35b6b60 x29: ffff8000a35b6c30 x28: 1fffe0001b8eb690 x27: ffff8000a35b6b80 x26: dfff800000000000 x25: ffff7000146b6d70 x24: ffff8000a35b6bb0 x23: ffff0000dc75b480 x22: ffff0000dc75b300 x21: ffff0000c7d10d80 x20: ffff8000a35b6ba0 x19: ffff0000ddb48640 x18: ffff0000cd1e68fc x17: ffff800123c76000 x16: ffff8000803b9ea0 x15: 0000000000000001 x14: 1fffe0001bb690c8 x13: ffff8000a35b8000 x12: 0000000000000003 x11: 0000000000000202 x10: 0000000000000000 x9 : 1fffe0001a7c0001 x8 : 0000000100000201 x7 : ffff800080441de8 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000000003 x1 : ffff80008b8ba180 x0 : ffff0000dc75b300 Call trace: 0xffff0000c7d10d80 (P) smc_fback_data_ready+0x88/0xac net/smc/af_smc.c:851 tcp_data_ready+0x22c/0x44c net/ipv4/tcp_input.c:5226 tcp_data_queue+0x1838/0x4b60 net/ipv4/tcp_input.c:5316 tcp_rcv_established+0xdb4/0x1f80 net/ipv4/tcp_input.c:6282 tcp_v4_do_rcv+0x3b8/0xc44 net/ipv4/tcp_ipv4.c:1918 sk_backlog_rcv include/net/sock.h:1122 [inline] __release_sock+0x1a8/0x3d8 net/core/sock.c:3106 release_sock+0x68/0x1b8 net/core/sock.c:3660 sk_wait_data+0x1ec/0x54c net/core/sock.c:3154 tcp_recvmsg_locked+0xab0/0x2ea0 net/ipv4/tcp.c:2701 tcp_recvmsg+0x1dc/0x714 net/ipv4/tcp.c:2852 inet_recvmsg+0x124/0x210 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1018 [inline] sock_recvmsg net/socket.c:1040 [inline] ____sys_recvmsg+0x230/0x6e4 net/socket.c:2788 ___sys_recvmsg net/socket.c:2830 [inline] __sys_recvmsg+0x240/0x314 net/socket.c:2863 __do_sys_recvmsg net/socket.c:2869 [inline] __se_sys_recvmsg net/socket.c:2866 [inline] __arm64_sys_recvmsg+0x80/0x94 net/socket.c:2866 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---