Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 50.419309][ T8486] loop0: detected capacity change from 4096 to 0 [ 50.427858][ T8486] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 50.437402][ T8486] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 50.451710][ T8486] EXT4-fs (loop0): mount failed executing program [ 55.694284][ T8494] loop0: detected capacity change from 4096 to 0 [ 55.702292][ T8494] Quota error (device loop0): v2_read_file_info: Free block number too big (0 >= 0). [ 55.712288][ T8494] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 55.726728][ T8494] EXT4-fs (loop0): mount failed [ 56.803860][ T8485] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 62.917396][ T8485] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff888111002100 (size 64): comm "syz-executor512", pid 8486, jiffies 4294942313 (age 12.560s) hex dump (first 32 bytes): 00 b0 73 0d 81 88 ff ff 00 00 00 00 00 00 00 00 ..s............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000099a174e4>] v2_read_file_info+0x1ae/0x430 [<00000000783cd265>] dquot_load_quota_sb+0x351/0x650 [<0000000006a5cc64>] dquot_load_quota_inode+0xda/0x160 [<000000004a3e23fe>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000136515d2>] ext4_fill_super+0x3fa5/0x5ad0 [<000000001545416b>] mount_bdev+0x223/0x260 [<0000000072c7a1ae>] legacy_get_tree+0x2b/0x90 [<000000003f607769>] vfs_get_tree+0x28/0x100 [<00000000d239fb21>] path_mount+0xc5e/0x1170 [<00000000e048ecfa>] __x64_sys_mount+0x18e/0x1d0 [<00000000cbaa6359>] do_syscall_64+0x2d/0x70 [<00000000611ae0a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888110a3aec0 (size 64): comm "syz-executor512", pid 8494, jiffies 4294942841 (age 7.280s) hex dump (first 32 bytes): 00 18 d8 0a 81 88 ff ff 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<0000000099a174e4>] v2_read_file_info+0x1ae/0x430 [<00000000783cd265>] dquot_load_quota_sb+0x351/0x650 [<0000000006a5cc64>] dquot_load_quota_inode+0xda/0x160 [<000000004a3e23fe>] ext4_enable_quotas+0x1b2/0x2f0 [<00000000136515d2>] ext4_fill_super+0x3fa5/0x5ad0 [<000000001545416b>] mount_bdev+0x223/0x260 [<0000000072c7a1ae>] legacy_get_tree+0x2b/0x90 [<000000003f607769>] vfs_get_tree+0x28/0x100 [<00000000d239fb21>] path_mount+0xc5e/0x1170 [<00000000e048ecfa>] __x64_sys_mount+0x18e/0x1d0 [<00000000cbaa6359>] do_syscall_64+0x2d/0x70 [<00000000611ae0a6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9