[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.174' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 51.488956][ T8418] loop0: detected capacity change from 4096 to 0 [ 51.497389][ T8418] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 51.509344][ T8418] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 51.538968][ T8418] EXT4-fs (loop0): mount failed executing program [ 57.475619][ T8425] loop0: detected capacity change from 4096 to 0 [ 57.483619][ T8425] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 57.496319][ T8425] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 57.518453][ T8425] EXT4-fs (loop0): mount failed [ 58.446140][ T8417] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810fb087c0 (size 64): comm "syz-executor071", pid 8418, jiffies 4294942422 (age 13.900s) hex dump (first 32 bytes): 00 08 a3 0b 81 88 ff ff 01 00 00 00 06 ca 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<000000001a715b15>] v2_read_file_info+0x1ae/0x430 [<00000000419abab8>] dquot_load_quota_sb+0x351/0x650 [<0000000073e2a6e1>] dquot_load_quota_inode+0xda/0x160 [<000000002b2cbbd0>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000cc47964b>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000357698a1>] mount_bdev+0x223/0x260 [<0000000099a7cd74>] legacy_get_tree+0x2b/0x90 [<00000000341a259c>] vfs_get_tree+0x28/0x100 [<000000009dd2f9a4>] path_mount+0xc5e/0x1170 [<000000004888ff15>] __x64_sys_mount+0x18e/0x1d0 [<000000000514f1b1>] do_syscall_64+0x2d/0x70 [<00000000d2b77647>] entry_SYSCALL_64_after_hwframe+0x44/0xa9