[  OK  ] Reached target Login Prompts.
[  OK  ] Reached target Multi-User System.
[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
[  OK  ] Started Update UTMP about System Runlevel Changes.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.87' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [   50.278932][ T8451] loop0: detected capacity change from 4096 to 0
[   50.287557][ T8451] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0).
[   50.297216][ T8451] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix.
[   50.311440][ T8451] EXT4-fs (loop0): mount failed
executing program
[   56.282868][ T8459] loop0: detected capacity change from 4096 to 0
[   56.291083][ T8459] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0).
[   56.300616][ T8459] EXT4-fs warning (device loop0): ext4_enable_quotas:6384: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix.
[   56.316390][ T8459] EXT4-fs (loop0): mount failed
[   57.307418][ T8450] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff88810c5056c0 (size 64):
  comm "syz-executor586", pid 8451, jiffies 4294942298 (age 13.950s)
  hex dump (first 32 bytes):
    00 18 fa 0f 81 88 ff ff 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00  ............H...
  backtrace:
    [<00000000ed4abb12>] v2_read_file_info+0x1ae/0x430
    [<000000005a995449>] dquot_load_quota_sb+0x351/0x650
    [<00000000f56142a3>] dquot_load_quota_inode+0xda/0x160
    [<00000000800d3dec>] ext4_enable_quotas+0x1b2/0x2f0
    [<0000000027dae85e>] ext4_fill_super+0x3fa5/0x5ad0
    [<0000000086bded8d>] mount_bdev+0x223/0x260
    [<000000000188a38d>] legacy_get_tree+0x2b/0x90
    [<000000006e575a4f>] vfs_get_tree+0x28/0x100
    [<00000000aa5e795a>] path_mount+0xc5e/0x1170
    [<00000000db88e550>] __x64_sys_mount+0x18e/0x1d0
    [<00000000926d47c4>] do_syscall_64+0x2d/0x70
    [<00000000bc73849f>] entry_SYSCALL_64_after_hwframe+0x44/0xa9