Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. executing program [ 51.484438][ T8434] loop0: detected capacity change from 4096 to 0 [ 51.493514][ T8434] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 51.505831][ T8434] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 51.536142][ T8434] EXT4-fs (loop0): mount failed executing program [ 56.635515][ T8441] loop0: detected capacity change from 4096 to 0 [ 56.643831][ T8441] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (52959232 > 6144). [ 56.656063][ T8441] EXT4-fs warning (device loop0): ext4_enable_quotas:6430: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 56.677091][ T8441] EXT4-fs (loop0): mount failed [ 61.666957][ T8433] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 63.721792][ T8433] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff8881110b2c00 (size 64): comm "syz-executor580", pid 8434, jiffies 4294942408 (age 12.300s) hex dump (first 32 bytes): 00 f0 44 0a 81 88 ff ff 01 00 00 00 06 ca 00 00 ..D............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000ffa69b3f>] v2_read_file_info+0x1ae/0x430 [<0000000049e6b678>] dquot_load_quota_sb+0x351/0x650 [<000000005cb8b1e1>] dquot_load_quota_inode+0xda/0x160 [<0000000035ca079f>] ext4_enable_quotas+0x1b2/0x2f0 [<000000001fa25ad6>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f866b91b>] mount_bdev+0x223/0x260 [<0000000061126b0d>] legacy_get_tree+0x2b/0x90 [<00000000ae231506>] vfs_get_tree+0x28/0x100 [<0000000035d479db>] path_mount+0xc5e/0x1170 [<00000000b76e71ae>] __x64_sys_mount+0x18e/0x1d0 [<000000007f8de930>] do_syscall_64+0x2d/0x70 [<000000007195d216>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff8881110b2140 (size 64): comm "syz-executor580", pid 8441, jiffies 4294942923 (age 7.150s) hex dump (first 32 bytes): 00 f0 44 0a 81 88 ff ff 01 00 00 00 06 ca 00 00 ..D............. 00 00 00 00 00 00 00 00 0a 00 00 00 48 00 00 00 ............H... backtrace: [<00000000ffa69b3f>] v2_read_file_info+0x1ae/0x430 [<0000000049e6b678>] dquot_load_quota_sb+0x351/0x650 [<000000005cb8b1e1>] dquot_load_quota_inode+0xda/0x160 [<0000000035ca079f>] ext4_enable_quotas+0x1b2/0x2f0 [<000000001fa25ad6>] ext4_fill_super+0x3fa5/0x5ad0 [<00000000f866b91b>] mount_bdev+0x223/0x260 [<0000000061126b0d>] legacy_get_tree+0x2b/0x90 [<00000000ae231506>] vfs_get_tree+0x28/0x100 [<0000000035d479db>] path_mount+0xc5e/0x1170 [<00000000b76e71ae>] __x64_sys_mount+0x18e/0x1d0 [<000000007f8de930>] do_syscall_64+0x2d/0x70 [<000000007195d216>] entry_SYSCALL_64_after_hwframe+0x44/0xa9