Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. executing program [ 54.389399][ T8409] loop0: detected capacity change from 4096 to 0 [ 54.398288][ T8409] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 54.410716][ T8409] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 54.432077][ T8409] EXT4-fs (loop0): mount failed executing program [ 59.693220][ T8417] loop0: detected capacity change from 4096 to 0 [ 59.701600][ T8417] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 59.714080][ T8417] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 59.736049][ T8417] EXT4-fs (loop0): mount failed [ 60.846149][ T8408] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 67.075365][ T8408] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110be3200 (size 64): comm "syz-executor862", pid 8409, jiffies 4294942707 (age 12.740s) hex dump (first 32 bytes): 00 90 7d 0d 81 88 ff ff 01 00 00 00 06 ca 9c 4d ..}............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<000000001d2c1b5c>] v2_read_file_info+0x1ae/0x430 [<000000009d65df57>] dquot_load_quota_sb+0x351/0x650 [<0000000076881baf>] dquot_load_quota_inode+0xda/0x160 [<00000000171bf253>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000f5af5ca5>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000ea473f42>] mount_bdev+0x223/0x260 [<000000002e449b88>] legacy_get_tree+0x2b/0x90 [<00000000f00bbea7>] vfs_get_tree+0x28/0x100 [<000000001bb7046e>] path_mount+0xc5e/0x1170 [<0000000068b20220>] __x64_sys_mount+0x18e/0x1d0 [<00000000d5205df0>] do_syscall_64+0x2d/0x70 [<000000001422fb85>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110be3e80 (size 64): comm "syz-executor862", pid 8417, jiffies 4294943238 (age 7.430s) hex dump (first 32 bytes): 00 90 7d 0d 81 88 ff ff 01 00 00 00 06 ca 9c 4d ..}............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<000000001d2c1b5c>] v2_read_file_info+0x1ae/0x430 [<000000009d65df57>] dquot_load_quota_sb+0x351/0x650 [<0000000076881baf>] dquot_load_quota_inode+0xda/0x160 [<00000000171bf253>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000f5af5ca5>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000ea473f42>] mount_bdev+0x223/0x260 [<000000002e449b88>] legacy_get_tree+0x2b/0x90 [<00000000f00bbea7>] vfs_get_tree+0x28/0x100 [<000000001bb7046e>] path_mount+0xc5e/0x1170 [<0000000068b20220>] __x64_sys_mount+0x18e/0x1d0 [<00000000d5205df0>] do_syscall_64+0x2d/0x70 [<000000001422fb85>] entry_SYSCALL_64_after_hwframe+0x44/0xa9