Warning: Permanently added '10.128.0.228' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 64.041887][ T8411] loop0: detected capacity change from 4096 to 0 [ 64.050345][ T8411] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 64.063213][ T8411] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 64.093510][ T8411] EXT4-fs (loop0): mount failed executing program [ 70.040000][ T8418] loop0: detected capacity change from 4096 to 0 [ 70.048058][ T8418] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 70.060614][ T8418] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 70.083303][ T8418] EXT4-fs (loop0): mount failed [ 71.006098][ T8410] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881109eeb40 (size 64): comm "syz-executor703", pid 8411, jiffies 4294943677 (age 13.900s) hex dump (first 32 bytes): 00 38 74 0a 81 88 ff ff 01 00 00 00 06 ca 9c 4d .8t............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<00000000dfb4f8b1>] v2_read_file_info+0x1ae/0x430 [<00000000c0b9f26f>] dquot_load_quota_sb+0x351/0x650 [<0000000033a3091d>] dquot_load_quota_inode+0xda/0x160 [<00000000189e2cc3>] ext4_enable_quotas+0x1b2/0x2f0 [<000000005cdcf261>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000733df052>] mount_bdev+0x223/0x260 [<0000000091becf8c>] legacy_get_tree+0x2b/0x90 [<000000008a979bbe>] vfs_get_tree+0x28/0x100 [<0000000067b90293>] path_mount+0xc5e/0x1170 [<00000000673a8144>] __x64_sys_mount+0x18e/0x1d0 [<00000000a780efe9>] do_syscall_64+0x2d/0x70 [<000000002820e857>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881109ee640 (size 64): comm "syz-executor703", pid 8418, jiffies 4294944277 (age 7.900s) hex dump (first 32 bytes): 00 c8 5c 0a 81 88 ff ff 01 00 00 00 06 ca 9c 4d ..\............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<00000000dfb4f8b1>] v2_read_file_info+0x1ae/0x430 [<00000000c0b9f26f>] dquot_load_quota_sb+0x351/0x650 [<0000000033a3091d>] dquot_load_quota_inode+0xda/0x160 [<00000000189e2cc3>] ext4_enable_quotas+0x1b2/0x2f0 [<000000005cdcf261>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000733df052>] mount_bdev+0x223/0x260 [<0000000091becf8c>] legacy_get_tree+0x2b/0x90 [<000000008a979bbe>] vfs_get_tree+0x28/0x100 [<0000000067b90293>] path_mount+0xc5e/0x1170 [<00000000673a8144>] __x64_sys_mount+0x18e/0x1d0 [<00000000a780efe9>] do_syscall_64+0x2d/0x70 [<000000002820e857>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 77.887551][ T8410] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)