sendmmsg$inet6(r1, &(0x7f0000005280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8004) socket$packet(0x11, 0x2, 0x300) sendmmsg$inet6(r1, &(0x7f000000c840)=[{{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000080)='?', 0x1}], 0x1, 0x0, 0x0, 0x1f4}}], 0x1, 0x0) BUG: memory leak unreferenced object 0xffff8880430ff000 (size 192): comm "syz-executor.0", pid 24294, jiffies 4297980941 hex dump (first 32 bytes): 00 f9 0f 43 80 88 ff ff fe 29 00 00 82 02 38 00 ...C.....)....8. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc d5464397): [<000000001d4111f6>] __kmalloc_node_noprof+0x36c/0x4a0 [<000000001bc68e82>] __kvmalloc_node_noprof+0x178/0x200 [<000000001f51d654>] want_pages_array+0x98/0xf0 [<00000000aa32f58e>] iov_iter_extract_pages+0x88f/0x1fa0 [<000000004413c3a9>] bio_map_user_iov+0x2ed/0xa50 [<00000000d3575f2a>] blk_rq_map_user_iov+0x618/0x1180 [<00000000dcab8a92>] blk_rq_map_user_io+0x1d1/0x200 [<000000003b532c65>] sg_io+0x565/0xd80 [<00000000bd713ec9>] scsi_cdrom_send_packet+0x2a9/0x520 [<00000000003fc899>] scsi_ioctl+0x131/0x15a0 [<000000001fa50de7>] sr_block_ioctl+0x213/0x260 [<000000003b8ef522>] blkdev_ioctl+0x27e/0x6d0 [<0000000013f4c360>] __x64_sys_ioctl+0x1a7/0x210 [<0000000095bf059e>] do_syscall_64+0xbf/0x1d0 [<000000009c52d0d8>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed