executing program BUG: memory leak unreferenced object 0xffff8881140ffc00 (size 1024): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1d 00 07 41 00 00 00 00 00 00 00 00 00 00 00 00 ...A............ backtrace: [] kmalloc include/linux/slab.h:596 [inline] [] sk_prot_alloc+0xd2/0x1b0 net/core/sock.c:1808 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] can_create+0x108/0x300 net/can/af_can.c:158 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff8881170d2340 (size 32): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): b0 02 05 40 81 88 ff ff 00 00 00 00 00 00 00 00 ...@............ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:591 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] apparmor_sk_alloc_security+0x53/0xd0 security/apparmor/lsm.c:785 [] security_sk_alloc+0x31/0x70 security/security.c:2261 [] sk_prot_alloc+0xed/0x1b0 net/core/sock.c:1811 [] sk_alloc+0x30/0x3f0 net/core/sock.c:1861 [] can_create+0x108/0x300 net/can/af_can.c:158 [] __sock_create+0x1ab/0x2b0 net/socket.c:1450 [] sock_create net/socket.c:1501 [inline] [] __sys_socket+0x6f/0x140 net/socket.c:1543 [] __do_sys_socket net/socket.c:1552 [inline] [] __se_sys_socket net/socket.c:1550 [inline] [] __x64_sys_socket+0x1a/0x20 net/socket.c:1550 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88811344a100 (size 232): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 2c 10 81 88 ff ff 00 fc 0f 14 81 88 ff ff ..,............. backtrace: [] __alloc_skb+0x20f/0x280 net/core/skbuff.c:414 [] alloc_skb include/linux/skbuff.h:1112 [inline] [] alloc_skb_with_frags+0x6a/0x2b0 net/core/skbuff.c:6005 [] sock_alloc_send_pskb+0x353/0x3c0 net/core/sock.c:2461 [] j1939_sk_alloc_skb net/can/j1939/socket.c:861 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1043 [inline] [] j1939_sk_sendmsg+0x2cf/0x800 net/can/j1939/socket.c:1178 [] sock_sendmsg_nosec net/socket.c:703 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:723 [] ____sys_sendmsg+0x36c/0x390 net/socket.c:2392 [] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2446 [] __sys_sendmsg+0x88/0x100 net/socket.c:2475 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae BUG: memory leak unreferenced object 0xffff88811344aa00 (size 232): comm "syz-executor060", pid 8644, jiffies 4294942938 (age 13.010s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 2c 10 81 88 ff ff 00 fc 0f 14 81 88 ff ff ..,............. backtrace: [] __alloc_skb+0x20f/0x280 net/core/skbuff.c:414 [] alloc_skb include/linux/skbuff.h:1112 [inline] [] alloc_skb_with_frags+0x6a/0x2b0 net/core/skbuff.c:6005 [] sock_alloc_send_pskb+0x353/0x3c0 net/core/sock.c:2461 [] j1939_sk_alloc_skb net/can/j1939/socket.c:861 [inline] [] j1939_sk_send_loop net/can/j1939/socket.c:1043 [inline] [] j1939_sk_sendmsg+0x2cf/0x800 net/can/j1939/socket.c:1178 [] sock_sendmsg_nosec net/socket.c:703 [inline] [] sock_sendmsg+0x56/0x80 net/socket.c:723 [] ____sys_sendmsg+0x36c/0x390 net/socket.c:2392 [] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2446 [] __sys_sendmsg+0x88/0x100 net/socket.c:2475 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae