nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 4131, name: syz-executor.0 preempt_count: 0, expected: 0 RCU nest depth: 1, expected: 0 2 locks held by syz-executor.0/4131: #0: ffff88801aef0d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1664 [inline] #0: ffff88801aef0d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x16/0x40 net/ipv4/tcp.c:1472 #1: ffffffff8bb0fea0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 CPU: 1 PID: 4131 Comm: syz-executor.0 Not tainted 5.19.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x163/0x213 lib/dump_stack.c:106 __might_resched+0x538/0x6a0 kernel/sched/core.c:9791 might_alloc include/linux/sched/mm.h:274 [inline] slab_pre_alloc_hook mm/slab.h:723 [inline] slab_alloc_node mm/slub.c:3128 [inline] slab_alloc mm/slub.c:3222 [inline] kmem_cache_alloc_trace+0x59/0x310 mm/slub.c:3253 kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:733 [inline] alloc_sk_msg net/core/skmsg.c:504 [inline] sk_psock_skb_ingress_self+0x56/0x300 net/core/skmsg.c:597 sk_psock_verdict_apply+0x335/0x3c0 net/core/skmsg.c:1004 sk_psock_verdict_recv+0x224/0x3d0 net/core/skmsg.c:1191 tcp_read_skb+0x1c3/0x400 net/ipv4/tcp.c:1752 tcp_rcv_established+0xf62/0x1c40 net/ipv4/tcp_input.c:5951 tcp_v4_do_rcv+0x24d/0x920 net/ipv4/tcp_ipv4.c:1659 sk_backlog_rcv include/net/sock.h:1047 [inline] __release_sock+0x194/0x420 net/core/sock.c:2850 release_sock+0x51/0x170 net/core/sock.c:3405 tcp_sendmsg+0x2e/0x40 net/ipv4/tcp.c:1474 sock_sendmsg_nosec net/socket.c:714 [inline] sock_sendmsg net/socket.c:734 [inline] __sys_sendto+0x3b6/0x4f0 net/socket.c:2116 __do_sys_sendto net/socket.c:2128 [inline] __se_sys_sendto net/socket.c:2124 [inline] __x64_sys_sendto+0xd5/0xf0 net/socket.c:2124 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7ff49f08b5a9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff4a01f8168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007ff49f1abf80 RCX: 00007ff49f08b5a9 RDX: 0000000000000001 RSI: 0000000020000200 RDI: 0000000000000003 RBP: 00007ff49f0e6580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd8099dd7f R14: 00007ff4a01f8300 R15: 0000000000022000