[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.16' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 52.160542][ T8480] loop0: detected capacity change from 4096 to 0 [ 52.168792][ T8480] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 52.178715][ T8480] EXT4-fs warning (device loop0): ext4_enable_quotas:6392: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 52.193087][ T8480] EXT4-fs (loop0): mount failed executing program [ 58.276055][ T8488] loop0: detected capacity change from 4096 to 0 [ 58.284140][ T8488] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 58.293617][ T8488] EXT4-fs warning (device loop0): ext4_enable_quotas:6392: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 58.308178][ T8488] EXT4-fs (loop0): mount failed [ 64.244367][ T8479] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810ef9f140 (size 64): comm "syz-executor837", pid 8480, jiffies 4294942489 (age 14.160s) hex dump (first 32 bytes): 00 20 b7 09 81 88 ff ff 00 00 00 00 00 00 00 00 . .............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000095d08251>] v2_read_file_info+0x1ae/0x430 [<00000000fc94be4f>] dquot_load_quota_sb+0x351/0x650 [<0000000037480082>] dquot_load_quota_inode+0xda/0x160 [<00000000f12114ff>] ext4_enable_quotas+0x1b2/0x2f0 [<000000003e38d76a>] ext4_fill_super+0x3bc5/0x5ac0 [<00000000574202f4>] mount_bdev+0x223/0x260 [<0000000005c81ffe>] legacy_get_tree+0x2b/0x90 [<00000000d8c64796>] vfs_get_tree+0x28/0x100 [<00000000bbd2ec49>] path_mount+0xc5e/0x1170 [<0000000045550195>] __x64_sys_mount+0x18e/0x1d0 [<000000000fa954c7>] do_syscall_64+0x2d/0x70 [<00000000b013cc12>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810ef9f6c0 (size 64): comm "syz-executor837", pid 8488, jiffies 4294943101 (age 8.040s) hex dump (first 32 bytes): 00 20 b7 09 81 88 ff ff 00 00 00 00 00 00 00 00 . .............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000095d08251>] v2_read_file_info+0x1ae/0x430 [<00000000fc94be4f>] dquot_load_quota_sb+0x351/0x650 [<0000000037480082>] dquot_load_quota_inode+0xda/0x160 [<00000000f12114ff>] ext4_enable_quotas+0x1b2/0x2f0 [<000000003e38d76a>] ext4_fill_super+0x3bc5/0x5ac0 [<00000000574202f4>] mount_bdev+0x223/0x260 [<0000000005c81ffe>] legacy_get_tree+0x2b/0x90 [<00000000d8c64796>] vfs_get_tree+0x28/0x100 [<00000000bbd2ec49>] path_mount+0xc5e/0x1170 [<0000000045550195>] __x64_sys_mount+0x18e/0x1d0 [<000000000fa954c7>] do_syscall_64+0x2d/0x70 [<00000000b013cc12>] entry_SYSCALL_64_after_hwframe+0x44/0xa9