[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.199' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 51.015659][ T8463] loop0: detected capacity change from 4096 to 0 [ 51.025107][ T8463] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 51.034653][ T8463] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 51.049479][ T8463] EXT4-fs (loop0): mount failed executing program [ 56.684284][ T8470] loop0: detected capacity change from 4096 to 0 [ 56.693381][ T8470] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 56.703105][ T8470] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 56.718182][ T8470] EXT4-fs (loop0): mount failed [ 62.181305][ T8462] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 64.491879][ T8462] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110248840 (size 64): comm "syz-executor131", pid 8463, jiffies 4294942362 (age 13.550s) hex dump (first 32 bytes): 00 18 56 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ..V............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000099b7ccf>] v2_read_file_info+0x1ae/0x430 [<000000007c6cb184>] dquot_load_quota_sb+0x351/0x650 [<00000000d5ee4466>] dquot_load_quota_inode+0xda/0x160 [<000000008a9c99bf>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000a00e8af8>] ext4_fill_super+0x3fa5/0x5ad0 [<0000000086e55d7f>] mount_bdev+0x223/0x260 [<000000009b67d10d>] legacy_get_tree+0x2b/0x90 [<000000005ba08884>] vfs_get_tree+0x28/0x100 [<0000000067abaa93>] path_mount+0xc5e/0x1170 [<000000006d9d1624>] __x64_sys_mount+0x18e/0x1d0 [<000000001743cbb3>] do_syscall_64+0x2d/0x70 [<000000008c2387ff>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881103d0a00 (size 64): comm "syz-executor131", pid 8470, jiffies 4294942929 (age 7.880s) hex dump (first 32 bytes): 00 08 93 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000099b7ccf>] v2_read_file_info+0x1ae/0x430 [<000000007c6cb184>] dquot_load_quota_sb+0x351/0x650 [<00000000d5ee4466>] dquot_load_quota_inode+0xda/0x160 [<000000008a9c99bf>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000a00e8af8>] ext4_fill_super+0x3fa5/0x5ad0 [<0000000086e55d7f>] mount_bdev+0x223/0x260 [<000000009b67d10d>] legacy_get_tree+0x2b/0x90 [<000000005ba08884>] vfs_get_tree+0x28/0x100 [<0000000067abaa93>] path_mount+0xc5e/0x1170 [<000000006d9d1624>] __x64_sys_mount+0x18e/0x1d0 [<000000001743cbb3>] do_syscall_64+0x2d/0x70 [<000000008c2387ff>] entry_SYSCALL_64_after_hwframe+0x44/0xa9