Unable to handle kernel execute from non-executable memory at virtual address ffff0000ce7e0e80 KASAN: maybe wild-memory-access in range [0xfffc000673f07400-0xfffc000673f07407] Mem abort info: ESR = 0x000000008600000f EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0f: level 3 permission fault swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001a5b2c000 [ffff0000ce7e0e80] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f41b403, pmd=180000023f3a7403, pte=006800010e7e0707 Internal error: Oops: 000000008600000f [#1] PREEMPT SMP Modules linked in: CPU: 1 UID: 0 PID: 7384 Comm: syz.0.15 Not tainted 6.12.0-syzkaller-g7b1d1d4cfac0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff0000ce7e0e80 lr : smc_fback_forward_wakeup+0x1dc/0x514 net/smc/af_smc.c:822 sp : ffff80009e917140 x29: ffff80009e917210 x28: 1fffe00019bc1030 x27: ffff80009e917160 x26: dfff800000000000 x25: ffff700013d22e2c x24: ffff80009e917190 x23: ffff0000cde08180 x22: ffff0000cde08000 x21: ffff0000ce7e0e80 x20: ffff80009e917180 x19: ffff0000db513040 x18: ffff80009e916da0 x17: 000000000001b946 x16: ffff8000802a7fe0 x15: 0000000000000001 x14: 1fffe0001b6a2608 x13: ffff80009e918000 x12: 0000000000000003 x11: 0000000000000202 x10: 0000000000000000 x9 : 1fffe0001a5ceb59 x8 : 0000000100000201 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000020 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000003 x1 : ffff80008b634000 x0 : ffff0000cde08000 Call trace: 0xffff0000ce7e0e80 (P) smc_fback_forward_wakeup+0x1dc/0x514 net/smc/af_smc.c:822 (L) smc_fback_data_ready+0x88/0xac net/smc/af_smc.c:850 tcp_data_ready+0x22c/0x44c net/ipv4/tcp_input.c:5220 tcp_data_queue+0x18a4/0x4eb8 net/ipv4/tcp_input.c:5310 tcp_rcv_established+0xe10/0x2018 net/ipv4/tcp_input.c:6264 tcp_v4_do_rcv+0x3b8/0xc44 net/ipv4/tcp_ipv4.c:1915 sk_backlog_rcv include/net/sock.h:1115 [inline] __release_sock+0x1a8/0x3d8 net/core/sock.c:3078 __sk_flush_backlog+0x38/0xa4 net/core/sock.c:3098 sk_flush_backlog include/net/sock.h:1178 [inline] tcp_sendmsg_locked+0x3118/0x3eb8 net/ipv4/tcp.c:1163 tcp_sendmsg+0x40/0x64 net/ipv4/tcp.c:1357 inet_sendmsg+0x15c/0x290 net/ipv4/af_inet.c:853 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg net/socket.c:744 [inline] __sys_sendto+0x374/0x4f4 net/socket.c:2214 __do_sys_sendto net/socket.c:2226 [inline] __se_sys_sendto net/socket.c:2222 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2222 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x84/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600 Code: 00000000 00000000 00000000 00000000 (00000000) ---[ end trace 0000000000000000 ]---