Unable to handle kernel write to read-only memory at virtual address ffff80000cb9e7b5
Mem abort info:
  ESR = 0x000000009600004e
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x0e: level 2 permission fault
Data abort info:
  ISV = 0, ISS = 0x0000004e
  CM = 0, WnR = 1
swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001c566a000
[ffff80000cb9e7b5] pgd=100000023ffff003, p4d=100000023ffff003, pud=100000023fffe003, pmd=00600001c5000781
Internal error: Oops: 000000009600004e [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 2560 Comm: udevd Not tainted 6.0.0-rc6-syzkaller-17742-gc194837ebb57 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __memset+0x50/0x188
lr : slab_post_alloc_hook mm/slab.h:729 [inline]
lr : slab_alloc_node mm/slub.c:3243 [inline]
lr : slab_alloc mm/slub.c:3251 [inline]
lr : kmem_cache_alloc_trace+0x28c/0x340 mm/slub.c:3282
sp : ffff8000167339d0
x29: ffff8000167339e0 x28: ffff0000c4400000 x27: ffff80000d309000
x26: 0000000000000000 x25: 000000000fffffff x24: ffff80000cb9e7b5
x23: 0000000000000000 x22: ffff8000086faec4 x21: ffff0000c0001400
x20: 0000000000000178 x19: 0000000000000dc0 x18: 0000000000000000
x17: 0000000000000000 x16: ffff80000db49158 x15: ffff0000c4400000
x14: 0000000000000010 x13: 0000000000000000 x12: ffff0000c4400000
x11: 0000000000000001 x10: ffff8001f1d7d000 x9 : 0000000000080800
x8 : ffff80000cb9e7b5 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 000000000000000b x3 : 00000000000ec099
x2 : 0000000000000200 x1 : 0000000000000000 x0 : ffff80000cb9e7b5
Call trace:
 __memset+0x50/0x188
 kmalloc include/linux/slab.h:600 [inline]
 kzalloc include/linux/slab.h:733 [inline]
 kernfs_fop_open+0x1c4/0x554 fs/kernfs/file.c:680
 do_dentry_open+0x330/0x6d0 fs/open.c:878
 vfs_open+0x38/0x48 fs/open.c:1014
 do_open fs/namei.c:3557 [inline]
 path_openat+0xe34/0x11c4 fs/namei.c:3691
 do_filp_open+0xdc/0x1b8 fs/namei.c:3718
 do_sys_openat2+0xb8/0x22c fs/open.c:1311
 do_sys_open fs/open.c:1327 [inline]
 __do_sys_openat fs/open.c:1343 [inline]
 __se_sys_openat fs/open.c:1338 [inline]
 __arm64_sys_openat+0xb0/0xe0 fs/open.c:1338
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
 el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654
 el0t_64_sync+0x18c/0x190
Code: d65f03c0 cb0803e4 f2400c84 54000080 (a9001d07) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	d65f03c0 	ret
   4:	cb0803e4 	neg	x4, x8
   8:	f2400c84 	ands	x4, x4, #0xf
   c:	54000080 	b.eq	0x1c  // b.none
* 10:	a9001d07 	stp	x7, x7, [x8] <-- trapping instruction