Unable to handle kernel write to read-only memory at virtual address ffff80000cb9e7b5 Mem abort info: ESR = 0x000000009600004e EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x0e: level 2 permission fault Data abort info: ISV = 0, ISS = 0x0000004e CM = 0, WnR = 1 swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000001c566a000 [ffff80000cb9e7b5] pgd=100000023ffff003, p4d=100000023ffff003, pud=100000023fffe003, pmd=00600001c5000781 Internal error: Oops: 000000009600004e [#1] PREEMPT SMP Modules linked in: CPU: 1 PID: 2560 Comm: udevd Not tainted 6.0.0-rc6-syzkaller-17742-gc194837ebb57 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __memset+0x50/0x188 lr : slab_post_alloc_hook mm/slab.h:729 [inline] lr : slab_alloc_node mm/slub.c:3243 [inline] lr : slab_alloc mm/slub.c:3251 [inline] lr : kmem_cache_alloc_trace+0x28c/0x340 mm/slub.c:3282 sp : ffff8000167339d0 x29: ffff8000167339e0 x28: ffff0000c4400000 x27: ffff80000d309000 x26: 0000000000000000 x25: 000000000fffffff x24: ffff80000cb9e7b5 x23: 0000000000000000 x22: ffff8000086faec4 x21: ffff0000c0001400 x20: 0000000000000178 x19: 0000000000000dc0 x18: 0000000000000000 x17: 0000000000000000 x16: ffff80000db49158 x15: ffff0000c4400000 x14: 0000000000000010 x13: 0000000000000000 x12: ffff0000c4400000 x11: 0000000000000001 x10: ffff8001f1d7d000 x9 : 0000000000080800 x8 : ffff80000cb9e7b5 x7 : 0000000000000000 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 000000000000000b x3 : 00000000000ec099 x2 : 0000000000000200 x1 : 0000000000000000 x0 : ffff80000cb9e7b5 Call trace: __memset+0x50/0x188 kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:733 [inline] kernfs_fop_open+0x1c4/0x554 fs/kernfs/file.c:680 do_dentry_open+0x330/0x6d0 fs/open.c:878 vfs_open+0x38/0x48 fs/open.c:1014 do_open fs/namei.c:3557 [inline] path_openat+0xe34/0x11c4 fs/namei.c:3691 do_filp_open+0xdc/0x1b8 fs/namei.c:3718 do_sys_openat2+0xb8/0x22c fs/open.c:1311 do_sys_open fs/open.c:1327 [inline] __do_sys_openat fs/open.c:1343 [inline] __se_sys_openat fs/open.c:1338 [inline] __arm64_sys_openat+0xb0/0xe0 fs/open.c:1338 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall arch/arm64/kernel/syscall.c:52 [inline] el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:636 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:654 el0t_64_sync+0x18c/0x190 Code: d65f03c0 cb0803e4 f2400c84 54000080 (a9001d07) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: d65f03c0 ret 4: cb0803e4 neg x4, x8 8: f2400c84 ands x4, x4, #0xf c: 54000080 b.eq 0x1c // b.none * 10: a9001d07 stp x7, x7, [x8] <-- trapping instruction