[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.192' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.652888][ T8433] loop0: detected capacity change from 4096 to 0 [ 50.661868][ T8433] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 50.671439][ T8433] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 50.685700][ T8433] EXT4-fs (loop0): mount failed executing program [ 55.892588][ T8441] loop0: detected capacity change from 4096 to 0 [ 55.900707][ T8441] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 55.910703][ T8441] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 55.925276][ T8441] EXT4-fs (loop0): mount failed executing program [ 61.169366][ T8449] loop0: detected capacity change from 4096 to 0 [ 61.179515][ T8449] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 61.190276][ T8449] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 61.207100][ T8449] EXT4-fs (loop0): mount failed [ 62.351019][ T8432] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 66.431124][ T8432] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88811026acc0 (size 64): comm "syz-executor321", pid 8433, jiffies 4294942333 (age 17.980s) hex dump (first 32 bytes): 00 e8 75 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ..u............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<000000001208c9ea>] v2_read_file_info+0x1ae/0x430 [<00000000a200a46a>] dquot_load_quota_sb+0x351/0x650 [<000000003d6b1d81>] dquot_load_quota_inode+0xda/0x160 [<0000000012c97395>] ext4_enable_quotas+0x1b2/0x2f0 [<000000008395f0b3>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f27b2d1a>] mount_bdev+0x223/0x260 [<000000004e7ce403>] legacy_get_tree+0x2b/0x90 [<0000000034ce38bc>] vfs_get_tree+0x28/0x100 [<00000000d2c5e6e3>] path_mount+0xc5e/0x1170 [<00000000dd32ef97>] __x64_sys_mount+0x18e/0x1d0 [<00000000c508454a>] do_syscall_64+0x2d/0x70 [<00000000903ed3a4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810b306e80 (size 64): comm "syz-executor321", pid 8441, jiffies 4294942857 (age 12.740s) hex dump (first 32 bytes): 00 e0 75 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ..u............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<000000001208c9ea>] v2_read_file_info+0x1ae/0x430 [<00000000a200a46a>] dquot_load_quota_sb+0x351/0x650 [<000000003d6b1d81>] dquot_load_quota_inode+0xda/0x160 [<0000000012c97395>] ext4_enable_quotas+0x1b2/0x2f0 [<000000008395f0b3>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f27b2d1a>] mount_bdev+0x223/0x260 [<000000004e7ce403>] legacy_get_tree+0x2b/0x90 [<0000000034ce38bc>] vfs_get_tree+0x28/0x100 [<00000000d2c5e6e3>] path_mount+0xc5e/0x1170 [<00000000dd32ef97>] __x64_sys_mount+0x18e/0x1d0 [<00000000c508454a>] do_syscall_64+0x2d/0x70 [<00000000903ed3a4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88811107c200 (size 64): comm "syz-executor321", pid 8449, jiffies 4294943385 (age 7.460s) hex dump (first 32 bytes): 00 88 e9 0f 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<000000001208c9ea>] v2_read_file_info+0x1ae/0x430 [<00000000a200a46a>] dquot_load_quota_sb+0x351/0x650 [<000000003d6b1d81>] dquot_load_quota_inode+0xda/0x160 [<0000000012c97395>] ext4_enable_quotas+0x1b2/0x2f0 [<000000008395f0b3>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f27b2d1a>] mount_bdev+0x223/0x260 [<000000004e7ce403>] legacy_get_tree+0x2b/0x90 [<0000000034ce38bc>] vfs_get_tree+0x28/0x100 [<00000000d2c5e6e3>] path_mount+0xc5e/0x1170 [<00000000dd32ef97>] __x64_sys_mount+0x18e/0x1d0 [<00000000c508454a>] do_syscall_64+0x2d/0x70 [<00000000903ed3a4>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 68.579843][ T8432] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)