Unable to handle kernel paging request at virtual address 4bffffffffffffc0 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 [4bffffffffffffc0] address between user and kernel address ranges Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 3018 Comm: sshd Not tainted 6.1.0-rc4-syzkaller-31859-g56751c56c2a2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : deliver_ptype_list_skb net/core/dev.c:2201 [inline] pc : __netif_receive_skb_core+0xa98/0x10dc net/core/dev.c:5440 lr : deliver_ptype_list_skb net/core/dev.c:2200 [inline] lr : __netif_receive_skb_core+0xb6c/0x10dc net/core/dev.c:5440 sp : ffff800008003bb0 x29: ffff800008003bf0 x28: 4c00000000000000 x27: 0000000000000001 x26: 4c00000000000000 x25: ffff80000d2d0860 x24: ffff0001134058e4 x23: 0000000000000008 x22: ffff0000c9a21900 x21: ffff0000c6998000 x20: ffff000113405800 x19: 0000000000000000 x18: 0000000000000000 x17: d45b16bfe6740a08 x16: 0000000000000100 x15: 0000000000000100 x14: 0000000000000000 x13: 000000000000a888 x12: ffff80000d7af960 x11: ff8080000b20ba84 x10: 0000000000000000 x9 : ffff80000b20ba84 x8 : ffff0000c65b8000 x7 : ffff80000b209b9c x6 : 0000000000000000 x5 : 0000000000000000 x4 : ffff800008003bd0 x3 : ffff0000c6998000 x2 : ffff800008003bd4 x1 : 0000000000000008 x0 : 0000000000000000 Call trace: deliver_ptype_list_skb net/core/dev.c:2201 [inline] __netif_receive_skb_core+0xa98/0x10dc net/core/dev.c:5440 __netif_receive_skb_list_core+0xa8/0x2b0 net/core/dev.c:5565 __netif_receive_skb_list+0x16c/0x1d0 net/core/dev.c:5632 netif_receive_skb_list_internal+0x1e8/0x340 net/core/dev.c:5723 gro_normal_list include/net/gro.h:433 [inline] napi_complete_done+0x140/0x354 net/core/dev.c:6064 gve_napi_poll+0xcc/0x1b4 drivers/net/ethernet/google/gve/gve_main.c:214 __napi_poll+0x5c/0x24c net/core/dev.c:6498 napi_poll+0x110/0x484 net/core/dev.c:6565 net_rx_action+0x18c/0x414 net/core/dev.c:6676 _stext+0x168/0x37c ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 call_on_irq_stack+0x2c/0x54 arch/arm64/kernel/entry.S:892 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84 invoke_softirq+0x70/0xbc kernel/softirq.c:452 __irq_exit_rcu+0xf0/0x140 kernel/softirq.c:650 irq_exit_rcu+0x10/0x40 kernel/softirq.c:662 el0_interrupt+0x7c/0x218 arch/arm64/kernel/entry-common.c:717 __el0_irq_handler_common+0x18/0x24 arch/arm64/kernel/entry-common.c:724 el0t_64_irq_handler+0x10/0x1c arch/arm64/kernel/entry-common.c:729 el0t_64_irq+0x190/0x194 arch/arm64/kernel/entry.S:585 Code: eb19035f 54000b00 91039298 aa1a03fc (785c0f93) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: eb19035f cmp x26, x25 4: 54000b00 b.eq 0x164 // b.none 8: 91039298 add x24, x20, #0xe4 c: aa1a03fc mov x28, x26 * 10: 785c0f93 ldrh w19, [x28, #-64]! <-- trapping instruction