------------[ cut here ]------------ WARNING: CPU: 1 PID: 8986 at net/mptcp/subflow.c:1389 subflow_data_ready+0x1d0/0x22c net/mptcp/subflow.c:1388 Modules linked in: CPU: 1 PID: 8986 Comm: syz.0.962 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) pc : subflow_data_ready+0x1d0/0x22c net/mptcp/subflow.c:1388 lr : subflow_data_ready+0x1d0/0x22c net/mptcp/subflow.c:1388 sp : ffff800022987440 x29: ffff800022987440 x28: ffff0000ff60552c x27: dfff800000000000 x26: ffff0000dea024c0 x25: 00000000330cd599 x24: 0000000000000800 x23: ffff0000d2d2d800 x22: dfff800000000000 x21: 0000000000000000 x20: ffff0000e0625e00 x19: ffff0000dea024c0 x18: ffff800011b7bf60 x17: ffff80018a421000 x16: ffff8000082d9364 x15: 0000000000000002 x14: 0000000000000001 x13: 1fffe0001bd4049a x12: 0000000000080000 x11: 0000000000007c6d x10: ffff800023538000 x9 : ffff800011878084 x8 : 0000000000007c6e x7 : ffff80000805977c x6 : ffff80000805998c x5 : ffff0000fcebda68 x4 : ffff800022986fb0 x3 : ffff800011877f04 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: subflow_data_ready+0x1d0/0x22c net/mptcp/subflow.c:1388 tcp_data_ready+0x21c/0x428 net/ipv4/tcp_input.c:5107 tcp_data_queue+0x19e4/0x474c net/ipv4/tcp_input.c:5181 tcp_rcv_state_process+0x1f58/0x3854 net/ipv4/tcp_input.c:6791 tcp_v4_do_rcv+0x698/0xa7c net/ipv4/tcp_ipv4.c:1706 sk_backlog_rcv include/net/sock.h:1138 [inline] __release_sock+0x1b4/0x3b4 net/core/sock.c:2945 release_sock+0x60/0x1bc net/core/sock.c:3511 mptcp_do_fastclose+0x178/0x23c net/mptcp/protocol.c:2823 mptcp_disconnect+0x130/0x3a8 net/mptcp/protocol.c:3265 __inet_stream_connect+0x50c/0xc3c net/ipv4/af_inet.c:727 inet_stream_connect+0x74/0xb0 net/ipv4/af_inet.c:739 __sys_connect_file net/socket.c:2010 [inline] __sys_connect+0x28c/0x2b4 net/socket.c:2027 __do_sys_connect net/socket.c:2037 [inline] __se_sys_connect net/socket.c:2034 [inline] __arm64_sys_connect+0x7c/0x94 net/socket.c:2034 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b4 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:140 do_el0_svc+0x58/0x130 arch/arm64/kernel/syscall.c:204 el0_svc+0x58/0x128 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:585 irq event stamp: 14268 hardirqs last enabled at (14267): [] kasan_quarantine_put+0xc4/0x200 mm/kasan/quarantine.c:242 hardirqs last disabled at (14268): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405 softirqs last enabled at (14260): [] softirq_handle_end kernel/softirq.c:439 [inline] softirqs last enabled at (14260): [] handle_softirqs+0xaec/0xc60 kernel/softirq.c:624 softirqs last disabled at (14233): [] __do_softirq+0x14/0x20 kernel/softirq.c:630 ---[ end trace 0000000000000000 ]---