Unable to handle kernel execute from non-executable memory at virtual address ffff0000dcb77780 KASAN: maybe wild-memory-access in range [0xfffc0006e5bbbc00-0xfffc0006e5bbbc07] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000020730f000 [ffff0000dcb77780] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f41b403, pmd=180000023f335403, pte=006800011cb77707 Internal error: Oops: 000000008600000f [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 7415 Comm: syz.0.15 Not tainted 6.16.0-rc2-syzkaller-00009-g9aa9b43d689e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000dcb77780 lr : smc_fback_forward_wakeup+0x1bc/0x4ac net/smc/af_smc.c:828 sp : ffff80009d527120 x29: ffff80009d5271d0 x28: ffff0000e409d440 x27: 1fffe0001a5cacf0 x26: ffff80009d527120 x25: dfff800000000000 x24: ffff700013aa4e24 x23: 0000000000000001 x22: ffff0000d2e56780 x21: ffff0000d2e56600 x20: ffff0000dcb77780 x19: ffff0000c63e8000 x18: 00000000ffffffff x17: ffff800093320000 x16: ffff80008051f504 x15: 0000000000000001 x14: 1fffe0001c813a88 x13: 0000000000000000 x12: 0000000000000000 x11: ffff80009311fc08 x10: 0000000000000202 x9 : dfff800000000000 x8 : 0000000100000201 x7 : ffff8000804f7ae0 x6 : 0000000000000000 x5 : 0000000000000020 x4 : ffff80009d526e60 x3 : 0000000000000010 x2 : 0000000000000003 x1 : ffff80008ec0ede6 x0 : ffff0000d2e56600 Call trace: 0xffff0000dcb77780 (P) smc_fback_data_ready+0x84/0xa8 net/smc/af_smc.c:856 tcp_data_ready+0x21c/0x430 net/ipv4/tcp_input.c:5246 tcp_data_queue+0x16a8/0x4914 net/ipv4/tcp_input.c:5336 tcp_rcv_established+0xe64/0x1d4c net/ipv4/tcp_input.c:6308 tcp_v4_do_rcv+0x3c0/0xbc4 net/ipv4/tcp_ipv4.c:1925 sk_backlog_rcv include/net/sock.h:1148 [inline] __release_sock+0x19c/0x39c net/core/sock.c:3213 __sk_flush_backlog+0x34/0xa0 net/core/sock.c:3233 sk_flush_backlog include/net/sock.h:1211 [inline] tcp_sendmsg_locked+0x375c/0x4758 net/ipv4/tcp.c:1196 tcp_sendmsg+0x40/0x64 net/ipv4/tcp.c:1396 inet_sendmsg+0x154/0x284 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] __sys_sendto+0x36c/0x4f4 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2183 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---