BUG: MAX_STACK_TRACE_ENTRIES too low! turning off the locking correctness validator. CPU: 0 PID: 5005 Comm: syz-executor.0 Not tainted 5.1.0-rc2 #36 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 save_trace kernel/locking/lockdep.c:467 [inline] save_trace.cold+0x14/0x19 kernel/locking/lockdep.c:437 mark_lock+0x2fb/0x1380 kernel/locking/lockdep.c:3410 mark_irqflags kernel/locking/lockdep.c:3313 [inline] __lock_acquire+0xf2c/0x3fb0 kernel/locking/lockdep.c:3653 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:4211 down_write_nested+0x3c/0x90 kernel/locking/rwsem.c:193 alloc_super+0x158/0x890 fs/super.c:228 sget_userns+0xf1/0x560 fs/super.c:609 sget+0x10c/0x150 fs/super.c:660 mount_bdev+0xff/0x3c0 fs/super.c:1319 hfsplus_mount+0x35/0x40 fs/hfsplus/super.c:648 legacy_get_tree+0xf2/0x200 fs/fs_context.c:584 vfs_get_tree+0x123/0x450 fs/super.c:1481 do_new_mount fs/namespace.c:2622 [inline] do_mount+0x1436/0x2c40 fs/namespace.c:2942 ksys_mount+0xdb/0x150 fs/namespace.c:3151 __do_sys_mount fs/namespace.c:3165 [inline] __se_sys_mount fs/namespace.c:3162 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3162 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45ac7a Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 RSP: 002b:00007f6f2c31ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f6f2c31eb40 RCX: 000000000045ac7a RDX: 00007f6f2c31eae0 RSI: 0000000020000200 RDI: 00007f6f2c31eb00 RBP: 0000000000000000 R08: 00007f6f2c31eb40 R09: 00007f6f2c31eae0 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 R13: 00000000004c6a8e R14: 00000000004dc088 R15: 00000000ffffffff hfsplus: unable to find HFS+ superblock kobject: 'loop0' (00000000501f1bea): kobject_uevent_env kobject: 'loop0' (00000000501f1bea): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (00000000501f1bea): kobject_uevent_env kobject: 'loop0' (00000000501f1bea): fill_kobj_path: path = '/devices/virtual/block/loop0'