BUG: memory leak unreferenced object 0xffff888128cf0c00 (size 1024): comm "syz-executor.3", pid 9704, jiffies 4294944131 (age 12.900s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1d 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [] kmalloc include/linux/slab.h:599 [inline] [] sk_prot_alloc+0xd2/0x1b0 net/core/sock.c:1822 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1875 [] can_create+0x108/0x300 net/can/af_can.c:158 [] __sock_create+0x1ab/0x2b0 net/socket.c:1461 [] sock_create net/socket.c:1512 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1554 [] __do_sys_socket net/socket.c:1563 [inline] [] __se_sys_socket net/socket.c:1561 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1561 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888128d174c0 (size 32): comm "syz-executor.3", pid 9704, jiffies 4294944131 (age 12.900s) hex dump (first 32 bytes): b0 12 05 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:594 [inline] [] kzalloc include/linux/slab.h:731 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:785 [] security_sk_alloc+0x31/0x70 security/security.c:2262 [] sk_prot_alloc+0xed/0x1b0 net/core/sock.c:1825 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1875 [] can_create+0x108/0x300 net/can/af_can.c:158 [] __sock_create+0x1ab/0x2b0 net/socket.c:1461 [] sock_create net/socket.c:1512 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1554 [] __do_sys_socket net/socket.c:1563 [inline] [] __se_sys_socket net/socket.c:1561 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1561 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888128f1bf00 (size 232): comm "syz-executor.3", pid 9704, jiffies 4294944133 (age 12.880s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 6c 10 81 88 ff ff 00 0c cf 28 81 88 ff ff ..l........(.... backtrace: [] __alloc_skb+0x20f/0x280 net/core/skbuff.c:414 [] alloc_skb include/linux/skbuff.h:1116 [inline] [] alloc_skb_with_frags+0x6a/0x2b0 net/core/skbuff.c:6073 [] sock_alloc_send_pskb+0x353/0x3c0 net/core/sock.c:2475 [] j1939_sk_alloc_skb net/can/j1939/socket.c:861 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1118 [inline] [] j1939_sk_sendmsg+0x2cf/0x800 net/can/j1939/socket.c:1253 [] sock_sendmsg_nosec net/socket.c:704 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:724 [] ____sys_sendmsg+0x36c/0x390 net/socket.c:2406 [] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2460 [] __sys_sendmsg+0x88/0x100 net/socket.c:2489 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff888128f1be00 (size 232): comm "syz-executor.3", pid 9704, jiffies 4294944133 (age 12.880s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 6c 10 81 88 ff ff 00 0c cf 28 81 88 ff ff ..l........(.... backtrace: [] __alloc_skb+0x20f/0x280 net/core/skbuff.c:414 [] alloc_skb include/linux/skbuff.h:1116 [inline] [] alloc_skb_with_frags+0x6a/0x2b0 net/core/skbuff.c:6073 [] sock_alloc_send_pskb+0x353/0x3c0 net/core/sock.c:2475 [] j1939_sk_alloc_skb net/can/j1939/socket.c:861 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1118 [inline] [] j1939_sk_sendmsg+0x2cf/0x800 net/can/j1939/socket.c:1253 [] sock_sendmsg_nosec net/socket.c:704 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:724 [] ____sys_sendmsg+0x36c/0x390 net/socket.c:2406 [] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2460 [] __sys_sendmsg+0x88/0x100 net/socket.c:2489 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae