Unable to handle kernel paging request at virtual address dfff80000000023d
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
[dfff80000000023d] address between user and kernel address ranges
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 25552 Comm: syz-executor.1 Not tainted 5.15.147-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mem_cgroup_track_foreign_dirty_slowpath+0xe0/0x9f0 mm/memcontrol.c:4617
lr : trace_track_foreign_dirty include/trace/events/writeback.h:237 [inline]
lr : mem_cgroup_track_foreign_dirty_slowpath+0xd0/0x9f0 mm/memcontrol.c:4608
sp : ffff8000271f7820
x29: ffff8000271f7830 x28: 0000000100009873 x27: 0000000000000000
x26: dfff800000000000 x25: dfff800000000000 x24: 05ffc0000042000f
x23: ffff0000cc0245e0 x22: 0000000000000000 x21: 00000000000011e8
x20: ffff0000cc024060 x19: 0000000000000000 x18: 1fffe000368fe78e
x17: 1fffe000368fe78e x16: ffff80001198299c x15: ffff8000149bed40
x14: 1ffff0000292406a x13: dfff800000000000 x12: 000000001ca41596
x11: 0000000000000002 x10: 0000000000000003 x9 : 0000000000000000
x8 : 000000000000023d x7 : ffff8000089177ec x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000000 x3 : 0000000000000002
x2 : 0000000000000010 x1 : ffff800011f81200 x0 : 0000000000000001
Call trace:
 mem_cgroup_track_foreign_dirty_slowpath+0xe0/0x9f0 mm/memcontrol.c:4617
 mem_cgroup_track_foreign_dirty include/linux/memcontrol.h:1593 [inline]
 account_page_dirtied mm/page-writeback.c:2463 [inline]
 __set_page_dirty+0x8c0/0xc7c mm/page-writeback.c:2500
 __set_page_dirty_buffers+0x288/0x4b4 fs/buffer.c:643
 set_page_dirty+0x23c/0x544 mm/page-writeback.c:2609
 filemap_page_mkwrite+0x5d4/0xb24 mm/filemap.c:3380
 do_page_mkwrite+0x144/0x37c mm/memory.c:2892
 wp_page_shared+0x14c/0x398 mm/memory.c:3229
 do_wp_page+0x7cc/0x9c4 mm/memory.c:3330
 handle_pte_fault mm/memory.c:4639 [inline]
 __handle_mm_fault mm/memory.c:4756 [inline]
 handle_mm_fault+0x1bf8/0x3424 mm/memory.c:4854
 __do_page_fault arch/arm64/mm/fault.c:505 [inline]
 do_page_fault+0x700/0xb60 arch/arm64/mm/fault.c:605
 do_mem_abort+0x70/0x1d8 arch/arm64/mm/fault.c:819
 el0_da+0x94/0x20c arch/arm64/kernel/entry-common.c:494
 el0t_64_sync_handler+0xc0/0xe4 arch/arm64/kernel/entry-common.c:629
 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584
Code: 36002f20 52823d08 8b080275 d343fea8 (38796908) 
---[ end trace 54009901a6daf388 ]---
----------------
Code disassembly (best guess):
   0:	36002f20 	tbz	w0, #0, 0x5e4
   4:	52823d08 	mov	w8, #0x11e8                	// #4584
   8:	8b080275 	add	x21, x19, x8
   c:	d343fea8 	lsr	x8, x21, #3
* 10:	38796908 	ldrb	w8, [x8, x25] <-- trapping instruction