Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. executing program [ 49.873582][ T8461] loop0: detected capacity change from 4096 to 0 [ 49.882060][ T8461] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 49.894536][ T8461] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 49.915331][ T8461] EXT4-fs (loop0): mount failed executing program [ 55.829535][ T8468] loop0: detected capacity change from 4096 to 0 [ 55.837498][ T8468] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 55.849611][ T8468] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 55.870870][ T8468] EXT4-fs (loop0): mount failed executing program [ 61.802316][ T8476] loop0: detected capacity change from 4096 to 0 [ 61.810334][ T8476] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 61.822786][ T8476] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 61.843389][ T8476] EXT4-fs (loop0): mount failed [ 67.660338][ T8460] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110a62780 (size 64): comm "syz-executor288", pid 8461, jiffies 4294942249 (age 19.800s) hex dump (first 32 bytes): 00 08 a0 0e 81 88 ff ff 01 00 00 00 06 ca 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000c4233ce4>] v2_read_file_info+0x1ae/0x430 [<00000000074a1c01>] dquot_load_quota_sb+0x351/0x650 [<0000000071342870>] dquot_load_quota_inode+0xda/0x160 [<00000000b9f88b08>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000856f659d>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000fd5aff2c>] mount_bdev+0x223/0x260 [<00000000b2ba03eb>] legacy_get_tree+0x2b/0x90 [<00000000438dc381>] vfs_get_tree+0x28/0x100 [<000000001d446b6d>] path_mount+0xc5e/0x1170 [<00000000b1c2422e>] __x64_sys_mount+0x18e/0x1d0 [<00000000430217a4>] do_syscall_64+0x2d/0x70 [<00000000db8bde64>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110a62ac0 (size 64): comm "syz-executor288", pid 8468, jiffies 4294942845 (age 13.840s) hex dump (first 32 bytes): 00 08 a0 0e 81 88 ff ff 01 00 00 00 06 ca 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000c4233ce4>] v2_read_file_info+0x1ae/0x430 [<00000000074a1c01>] dquot_load_quota_sb+0x351/0x650 [<0000000071342870>] dquot_load_quota_inode+0xda/0x160 [<00000000b9f88b08>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000856f659d>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000fd5aff2c>] mount_bdev+0x223/0x260 [<00000000b2ba03eb>] legacy_get_tree+0x2b/0x90 [<00000000438dc381>] vfs_get_tree+0x28/0x100 [<000000001d446b6d>] path_mount+0xc5e/0x1170 [<00000000b1c2422e>] __x64_sys_mount+0x18e/0x1d0 [<00000000430217a4>] do_syscall_64+0x2d/0x70 [<00000000db8bde64>] entry_SYSCALL_64_after_hwframe+0x44/0xa9