Warning: Permanently added '10.128.0.211' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.030216][ T8467] loop0: detected capacity change from 545 to 0 [ 50.039626][ T8467] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 50.049125][ T8467] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 50.063566][ T8467] EXT4-fs (loop0): mount failed executing program [ 55.286922][ T8477] loop0: detected capacity change from 545 to 0 [ 55.298810][ T8477] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 55.308559][ T8477] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 55.322877][ T8477] EXT4-fs (loop0): mount failed executing program [ 60.548871][ T8487] loop0: detected capacity change from 545 to 0 [ 60.558208][ T8487] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 60.567784][ T8487] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 60.582477][ T8487] EXT4-fs (loop0): mount failed [ 65.717798][ T8466] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88810d7f85c0 (size 64): comm "syz-executor394", pid 8467, jiffies 4294942277 (age 17.850s) hex dump (first 32 bytes): 00 c8 c7 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000075d81fe1>] v2_read_file_info+0x1ae/0x430 [<0000000064880f98>] dquot_load_quota_sb+0x351/0x650 [<0000000045798ae9>] dquot_load_quota_inode+0xda/0x160 [<000000006d4e85ce>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000659b2e29>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000eb52e198>] mount_bdev+0x223/0x260 [<00000000aefe2dae>] legacy_get_tree+0x2b/0x90 [<000000008007b6c5>] vfs_get_tree+0x28/0x100 [<00000000dffa2dae>] path_mount+0xc5e/0x1170 [<00000000087e3c81>] __x64_sys_mount+0x18e/0x1d0 [<000000001903cea0>] do_syscall_64+0x2d/0x70 [<0000000015b0ca93>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff88810eb3e180 (size 64): comm "syz-executor394", pid 8477, jiffies 4294942803 (age 12.590s) hex dump (first 32 bytes): 00 c8 c7 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000075d81fe1>] v2_read_file_info+0x1ae/0x430 [<0000000064880f98>] dquot_load_quota_sb+0x351/0x650 [<0000000045798ae9>] dquot_load_quota_inode+0xda/0x160 [<000000006d4e85ce>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000659b2e29>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000eb52e198>] mount_bdev+0x223/0x260 [<00000000aefe2dae>] legacy_get_tree+0x2b/0x90 [<000000008007b6c5>] vfs_get_tree+0x28/0x100 [<00000000dffa2dae>] path_mount+0xc5e/0x1170 [<00000000087e3c81>] __x64_sys_mount+0x18e/0x1d0 [<000000001903cea0>] do_syscall_64+0x2d/0x70 [<0000000015b0ca93>] entry_SYSCALL_64_after_hwframe+0x44/0xa9