Warning: Permanently added '10.128.0.84' (ECDSA) to the list of known hosts. executing program [ 46.922299][ T8473] loop0: detected capacity change from 4096 to 0 [ 46.930948][ T8473] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 46.940442][ T8473] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 46.954660][ T8473] EXT4-fs (loop0): mount failed executing program [ 52.903491][ T8481] loop0: detected capacity change from 4096 to 0 [ 52.911542][ T8481] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 52.921437][ T8481] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 52.935748][ T8481] EXT4-fs (loop0): mount failed executing program [ 58.892614][ T8489] loop0: detected capacity change from 4096 to 0 [ 58.901201][ T8489] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 58.910705][ T8489] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 58.925465][ T8489] EXT4-fs (loop0): mount failed [ 59.892410][ T8472] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888111ebcdc0 (size 64): comm "syz-executor076", pid 8481, jiffies 4294942560 (age 13.870s) hex dump (first 32 bytes): 00 a0 1c 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000545a19f4>] v2_read_file_info+0x1ae/0x430 [<0000000073c2a6a4>] dquot_load_quota_sb+0x351/0x650 [<000000006bcb4c1e>] dquot_load_quota_inode+0xda/0x160 [<000000001714fb23>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000097229dd>] ext4_fill_super+0x3fa5/0x5ad0 [<000000005bb92d3c>] mount_bdev+0x223/0x260 [<0000000017f8ab1a>] legacy_get_tree+0x2b/0x90 [<00000000fb0f8a49>] vfs_get_tree+0x28/0x100 [<0000000051a0a95a>] path_mount+0xc5e/0x1170 [<0000000085ba65d7>] __x64_sys_mount+0x18e/0x1d0 [<0000000047ecedc5>] do_syscall_64+0x2d/0x70 [<000000006dd8c0d8>] entry_SYSCALL_64_after_hwframe+0x44/0xa9