(syz-executor,4195,0):__ocfs2_flush_truncate_log:6055 ERROR: status = -30
(syz-executor,4195,0):ocfs2_sync_fs:405 ERROR: status = -30
============================================
WARNING: possible recursive locking detected
syzkaller #0 Not tainted
--------------------------------------------
syz-executor/4195 is trying to acquire lock:
ffff88807a92a990 (jbd2_handle){++++}-{0:0}, at: jbd2_log_wait_commit+0x14c/0x4c0 fs/jbd2/journal.c:697
but task is already holding lock:
ffff88807a92a990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x134c/0x15c0 fs/jbd2/transaction.c:462
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(jbd2_handle);
lock(jbd2_handle);
*** DEADLOCK ***
May be due to missing lock nesting notation
4 locks held by syz-executor/4195:
#0: ffff88807d98e0e0 (&type->s_umount_key#58){+.+.}-{3:3}, at: deactivate_super+0xa0/0xd0 fs/super.c:365
#1: ffff88807d98e650 (sb_internal#2){.+.+}-{0:0}, at: ocfs2_replay_truncate_records fs/ocfs2/alloc.c:5938 [inline]
#1: ffff88807d98e650 (sb_internal#2){.+.+}-{0:0}, at: __ocfs2_flush_truncate_log+0x4a5/0x1110 fs/ocfs2/alloc.c:6052
#2: ffff8880721d9ce8 (&journal->j_trans_barrier){.+.+}-{3:3}, at: ocfs2_start_trans+0x3a6/0x6f0 fs/ocfs2/journal.c:374
#3: ffff88807a92a990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x134c/0x15c0 fs/jbd2/transaction.c:462
stack backtrace:
CPU: 0 PID: 4195 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
<TASK>
dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106
__lock_acquire+0x1236/0x7d10 kernel/locking/lockdep.c:-1
lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623
jbd2_log_wait_commit+0x168/0x4c0 fs/jbd2/journal.c:697
ocfs2_sync_fs+0x21d/0x330 fs/ocfs2/super.c:413
sync_filesystem+0x1be/0x220 fs/sync.c:66
generic_shutdown_super+0x6b/0x300 fs/super.c:448
kill_block_super+0x7c/0xe0 fs/super.c:1427
deactivate_locked_super+0x93/0xf0 fs/super.c:335
cleanup_mnt+0x42d/0x4e0 fs/namespace.c:1148
task_work_run+0x125/0x1a0 kernel/task_work.c:188
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0x10f/0x130 kernel/entry/common.c:181
exit_to_user_mode_prepare+0xee/0x180 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:307
do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f6a6cf929d7
Code: a2 c7 05 1c ed 24 00 00 00 00 00 eb 96 e8 e1 12 00 00 90 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8
RSP: 002b:00007ffdb432be38 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: 0000000000000000 RBX: 00007f6a6d026f90 RCX: 00007f6a6cf929d7
RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffdb432bef0
RBP: 00007ffdb432bef0 R08: 00007ffdb432cef0 R09: 00000000ffffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdb432cf80
R13: 00007f6a6d026f90 R14: 0000000000014fe1 R15: 00007ffdb432cfc0
</TASK>