------------[ cut here ]------------
WARNING: CPU: 1 PID: 6176 at net/kcm/kcmsock.c:630 kcm_write_msgs+0x1074/0x11dc net/kcm/kcmsock.c:630
Modules linked in:
CPU: 1 PID: 6176 Comm: syz-executor266 Not tainted 6.6.0-rc7-syzkaller-g8de1e7afcc1c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kcm_write_msgs+0x1074/0x11dc net/kcm/kcmsock.c:630
lr : kcm_write_msgs+0x1074/0x11dc net/kcm/kcmsock.c:630
sp : ffff800097067500
x29: ffff8000970676c0 x28: ffff0000c5c9734c x27: 1fffe00018b92e69
x26: ffff0000cb85d3f4 x25: 0000000000088000 x24: ffff0000e2804580
x23: dfff800000000000 x22: ffff0000c5c97350 x21: 0000000000000000
x20: ffff0000cb85d3f8 x19: ffff0000e34a2400 x18: ffff0001b41b3bb8
x17: 0000000000001000
 x16: ffff800080515ce8 x15: 000000000000000d
x14: 1ffff00012e0cec0 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : ffff0000c6529bc0 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000020
x2 : 0000000000000008 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 kcm_write_msgs+0x1074/0x11dc net/kcm/kcmsock.c:630
 kcm_sendmsg+0x1bfc/0x2118 net/kcm/kcmsock.c:905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 sock_write_iter+0x2d8/0x448 net/socket.c:1158
 call_write_iter include/linux/fs.h:1956 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x628/0x93c fs/read_write.c:584
 ksys_write+0x15c/0x26c fs/read_write.c:637
 __do_sys_write fs/read_write.c:649 [inline]
 __se_sys_write fs/read_write.c:646 [inline]
 __arm64_sys_write+0x7c/0x90 fs/read_write.c:646
 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155
 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678
 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595
irq event stamp: 13464
hardirqs last  enabled at (13463): [<ffff8000801d1cd8>] __local_bh_enable_ip+0x24c/0x4ac kernel/softirq.c:386
hardirqs last disabled at (13464): [<ffff80008a716d60>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:436
softirqs last  enabled at (13462): [<ffff8000888ace70>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last  enabled at (13462): [<ffff8000888ace70>] release_sock+0x15c/0x1b0 net/core/sock.c:3531
softirqs last disabled at (13460): [<ffff8000888acd50>] spin_lock_bh include/linux/spinlock.h:356 [inline]
softirqs last disabled at (13460): [<ffff8000888acd50>] release_sock+0x3c/0x1b0 net/core/sock.c:3518
---[ end trace 0000000000000000 ]---
KCM: Hard failure on kcm_write_msgs