Warning: Permanently added '10.128.1.22' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 48.786431][ T8413] loop0: detected capacity change from 4096 to 0 [ 48.796048][ T8413] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 48.806202][ T8413] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 48.820766][ T8413] EXT4-fs (loop0): mount failed executing program [ 53.993175][ T8421] loop0: detected capacity change from 4096 to 0 [ 54.001267][ T8421] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 54.011182][ T8421] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 54.025592][ T8421] EXT4-fs (loop0): mount failed executing program [ 59.193108][ T8429] loop0: detected capacity change from 4096 to 0 [ 59.201630][ T8429] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 59.211618][ T8429] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 59.226192][ T8429] EXT4-fs (loop0): mount failed [ 60.323568][ T8412] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110bbefc0 (size 64): comm "syz-executor085", pid 8421, jiffies 4294942669 (age 12.470s) hex dump (first 32 bytes): 00 70 c4 0d 81 88 ff ff 00 00 00 00 00 00 00 00 .p.............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000f0bdfe37>] v2_read_file_info+0x1ae/0x430 [<0000000055c8f193>] dquot_load_quota_sb+0x351/0x650 [<0000000065bb0282>] dquot_load_quota_inode+0xda/0x160 [<00000000dfb7b533>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000f4e1db61>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000a6b19d7a>] mount_bdev+0x223/0x260 [<0000000000e9c0d5>] legacy_get_tree+0x2b/0x90 [<000000006087820e>] vfs_get_tree+0x28/0x100 [<0000000064092754>] path_mount+0xc5e/0x1170 [<00000000bab9b7d6>] __x64_sys_mount+0x18e/0x1d0 [<000000001ad3648a>] do_syscall_64+0x2d/0x70 [<00000000beeb57cd>] entry_SYSCALL_64_after_hwframe+0x44/0xa9