r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x109840, 0x0) open_by_handle_at(r0, &(0x7f0000000140)=@ceph_nfs_confh={0x10, 0x2, {0xb}}, 0x0) (fail_nth: 10) BUG: memory leak unreferenced object 0xffff88800a4e6f80 (size 64): comm "syz-executor.4", pid 12818, jiffies 4295742289 hex dump (first 32 bytes): 00 61 4e 0a 80 88 ff ff 41 2f 00 00 7c 01 ea 06 .aN.....A/..|... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc fc4998c7): [<00000000bc40acdf>] __kmalloc_node_noprof+0x36c/0x4a0 [<00000000f21f3d5d>] __kvmalloc_node_noprof+0x178/0x200 [<00000000a0c172c4>] want_pages_array+0x98/0xf0 [<00000000ef877de6>] iov_iter_extract_pages+0x88f/0x1fa0 [<00000000835609ee>] bio_map_user_iov+0x2ed/0xa50 [<00000000f069de7c>] blk_rq_map_user_iov+0x618/0x1180 [<000000000a1bff6b>] blk_rq_map_user_io+0x1d1/0x200 [<00000000fa30643f>] sg_io+0x565/0xd80 [<000000005c1d0e53>] scsi_cdrom_send_packet+0x2a9/0x520 [<000000000b0988e3>] scsi_ioctl+0x131/0x15a0 [<000000005cfad569>] sr_block_ioctl+0x213/0x260 [<00000000f3b7974e>] blkdev_ioctl+0x27e/0x6d0 [<0000000036b7af3a>] __x64_sys_ioctl+0x1a7/0x210 [<00000000373cac15>] do_syscall_64+0xbf/0x1d0 [<0000000051c049c3>] entry_SYSCALL_64_after_hwframe+0x77/0x7f BUG: leak checking failed