[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.193' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 53.586707][ T8470] loop0: detected capacity change from 4096 to 0 [ 53.595194][ T8470] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 53.607846][ T8470] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 53.630509][ T8470] EXT4-fs (loop0): mount failed executing program [ 58.837033][ T8477] loop0: detected capacity change from 4096 to 0 [ 58.845149][ T8477] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (1333371869184 > 6144). [ 58.858000][ T8477] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 58.879968][ T8477] EXT4-fs (loop0): mount failed [ 59.931722][ T8469] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 66.101050][ T8469] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888110582040 (size 64): comm "syz-executor015", pid 8470, jiffies 4294942624 (age 12.570s) hex dump (first 32 bytes): 00 c8 af 0e 81 88 ff ff 01 00 00 00 06 ca 9c 4d ...............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<00000000d0f37a11>] v2_read_file_info+0x1ae/0x430 [<00000000bae82636>] dquot_load_quota_sb+0x351/0x650 [<00000000a95b7d9c>] dquot_load_quota_inode+0xda/0x160 [<00000000179ea182>] ext4_enable_quotas+0x1b2/0x2f0 [<000000007e302ff9>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000d389c0df>] mount_bdev+0x223/0x260 [<00000000ac41cf88>] legacy_get_tree+0x2b/0x90 [<00000000a8b9e6ba>] vfs_get_tree+0x28/0x100 [<00000000b1414383>] path_mount+0xc5e/0x1170 [<000000004bfae5c2>] __x64_sys_mount+0x18e/0x1d0 [<000000003802d82d>] do_syscall_64+0x2d/0x70 [<0000000091f4e335>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881106f1740 (size 64): comm "syz-executor015", pid 8477, jiffies 4294943149 (age 7.320s) hex dump (first 32 bytes): 00 c8 af 0e 81 88 ff ff 01 00 00 00 06 ca 9c 4d ...............M ad 71 ed 5d 49 e5 ce 55 0a 00 00 00 48 00 00 00 .q.]I..U....H... backtrace: [<00000000d0f37a11>] v2_read_file_info+0x1ae/0x430 [<00000000bae82636>] dquot_load_quota_sb+0x351/0x650 [<00000000a95b7d9c>] dquot_load_quota_inode+0xda/0x160 [<00000000179ea182>] ext4_enable_quotas+0x1b2/0x2f0 [<000000007e302ff9>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000d389c0df>] mount_bdev+0x223/0x260 [<00000000ac41cf88>] legacy_get_tree+0x2b/0x90 [<00000000a8b9e6ba>] vfs_get_tree+0x28/0x100 [<00000000b1414383>] path_mount+0xc5e/0x1170 [<000000004bfae5c2>] __x64_sys_mount+0x18e/0x1d0 [<000000003802d82d>] do_syscall_64+0x2d/0x70 [<0000000091f4e335>] entry_SYSCALL_64_after_hwframe+0x44/0xa9