Unable to handle kernel execute from non-executable memory at virtual address ffff0000cc820780 KASAN: maybe wild-memory-access in range [0xfffc000664103c00-0xfffc000664103c07] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000002079fa000 [ffff0000cc820780] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f41b403, pmd=180000023f3b6403, pte=006800010c820707 Internal error: Oops: 000000008600000f [#1] SMP Modules linked in: CPU: 1 UID: 0 PID: 7435 Comm: syz.0.16 Not tainted 6.15.0-rc7-syzkaller-00085-gd7fa1af5b33e #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000cc820780 lr : smc_fback_forward_wakeup+0x1bc/0x4ac net/smc/af_smc.c:828 sp : ffff8000a0af75e0 x29: ffff8000a0af7690 x28: ffff0000dbec6640 x27: 1fffe0001dab5e88 x26: ffff8000a0af75e0 x25: dfff800000000000 x24: ffff70001415eebc x23: 0000000000000001 x22: ffff0000ed5af440 x21: ffff0000ed5af2c0 x20: ffff0000cc820780 x19: ffff0000dd360000 x18: 00000000ffffffff x17: ffff800092f39000 x16: ffff80008051cacc x15: 0000000000000001 x14: 1fffe0001b7d8cc8 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800092d38c40 x10: 0000000000000202 x9 : dfff800000000000 x8 : 0000000100000201 x7 : ffff8000804f631c x6 : 0000000000000000 x5 : 0000000000000020 x4 : ffff8000a0af7320 x3 : 0000000000000010 x2 : 0000000000000003 x1 : ffff80008e905939 x0 : ffff0000ed5af2c0 Call trace: 0xffff0000cc820780 (P) smc_fback_data_ready+0x84/0xa8 net/smc/af_smc.c:856 tcp_urg+0x240/0x32c net/ipv4/tcp_input.c:5950 tcp_rcv_established+0xd34/0x1cc0 net/ipv4/tcp_input.c:6309 tcp_v4_do_rcv+0x3c0/0xbc4 net/ipv4/tcp_ipv4.c:1925 sk_backlog_rcv include/net/sock.h:1132 [inline] __release_sock+0x19c/0x39c net/core/sock.c:3163 release_sock+0x60/0x1ac net/core/sock.c:3717 tcp_sendmsg+0x4c/0x64 net/ipv4/tcp.c:1367 inet_sendmsg+0x154/0x284 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] __sys_sendto+0x36c/0x4f4 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2183 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---