Warning: Permanently added '10.128.1.25' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 63.260198][ T8463] loop0: detected capacity change from 4096 to 0 [ 63.269045][ T8463] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 63.278564][ T8463] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 63.293259][ T8463] EXT4-fs (loop0): mount failed executing program [ 69.258452][ T8471] loop0: detected capacity change from 4096 to 0 [ 69.266573][ T8471] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 69.276077][ T8471] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 69.290242][ T8471] EXT4-fs (loop0): mount failed executing program [ 75.262447][ T8479] loop0: detected capacity change from 4096 to 0 [ 75.270712][ T8479] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 75.280242][ T8479] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 75.294450][ T8479] EXT4-fs (loop0): mount failed [ 81.144728][ T8462] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888108cc55c0 (size 64): comm "syz-executor618", pid 8471, jiffies 4294944197 (age 13.920s) hex dump (first 32 bytes): 00 68 6d 10 81 88 ff ff 00 00 00 00 00 00 00 00 .hm............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000ca20aa57>] v2_read_file_info+0x1ae/0x430 [<00000000ace02a8f>] dquot_load_quota_sb+0x351/0x650 [<0000000093326c85>] dquot_load_quota_inode+0xda/0x160 [<00000000b64d9a2e>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000bd804dad>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f5c5c5c0>] mount_bdev+0x223/0x260 [<00000000b8cf61f5>] legacy_get_tree+0x2b/0x90 [<000000006ac0eb1e>] vfs_get_tree+0x28/0x100 [<0000000066eda216>] path_mount+0xc5e/0x1170 [<0000000096c445d8>] __x64_sys_mount+0x18e/0x1d0 [<00000000463f05ed>] do_syscall_64+0x2d/0x70 [<000000003d0c1371>] entry_SYSCALL_64_after_hwframe+0x44/0xa9