Warning: Permanently added '10.128.10.7' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.873847][ T8455] loop0: detected capacity change from 4096 to 0 [ 50.883769][ T8455] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 50.893328][ T8455] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 50.907929][ T8455] EXT4-fs (loop0): mount failed executing program [ 56.142605][ T8463] loop0: detected capacity change from 4096 to 0 [ 56.150770][ T8463] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 56.160722][ T8463] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 56.175193][ T8463] EXT4-fs (loop0): mount failed executing program [ 61.401171][ T8471] loop0: detected capacity change from 4096 to 0 [ 61.409569][ T8471] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 61.419431][ T8471] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 61.433818][ T8471] EXT4-fs (loop0): mount failed executing program [ 66.603479][ T8479] loop0: detected capacity change from 4096 to 0 [ 66.611777][ T8479] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 66.621350][ T8479] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 66.635734][ T8479] EXT4-fs (loop0): mount failed [ 67.723925][ T8454] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 71.754591][ T8454] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110dae680 (size 64): comm "syz-executor836", pid 8463, jiffies 4294942885 (age 17.750s) hex dump (first 32 bytes): 00 58 42 0d 81 88 ff ff 00 00 00 00 00 00 00 00 .XB............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000aa81c88c>] v2_read_file_info+0x1ae/0x430 [<000000002e678ee9>] dquot_load_quota_sb+0x351/0x650 [<0000000002e5769b>] dquot_load_quota_inode+0xda/0x160 [<0000000031108198>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000cb5d5404>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000ae152c9c>] mount_bdev+0x223/0x260 [<00000000b3b94559>] legacy_get_tree+0x2b/0x90 [<000000008e193fd7>] vfs_get_tree+0x28/0x100 [<000000005f01b40c>] path_mount+0xc5e/0x1170 [<00000000cce6dbc5>] __x64_sys_mount+0x18e/0x1d0 [<00000000964beb27>] do_syscall_64+0x2d/0x70 [<0000000007a40b46>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110dae480 (size 64): comm "syz-executor836", pid 8471, jiffies 4294943411 (age 12.490s) hex dump (first 32 bytes): 00 08 aa 0b 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000aa81c88c>] v2_read_file_info+0x1ae/0x430 [<000000002e678ee9>] dquot_load_quota_sb+0x351/0x650 [<0000000002e5769b>] dquot_load_quota_inode+0xda/0x160 [<0000000031108198>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000cb5d5404>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000ae152c9c>] mount_bdev+0x223/0x260 [<00000000b3b94559>] legacy_get_tree+0x2b/0x90 [<000000008e193fd7>] vfs_get_tree+0x28/0x100 [<000000005f01b40c>] path_mount+0xc5e/0x1170 [<00000000cce6dbc5>] __x64_sys_mount+0x18e/0x1d0 [<00000000964beb27>] do_syscall_64+0x2d/0x70 [<0000000007a40b46>] entry_SYSCALL_64_after_hwframe+0x44/0xa9