syzbot |
sign-in | mailing list | source | docs | 🏰 |
| ID | Workflow | Result | Correct | Bug | Created | Started | Finished | Revision | Error |
|---|---|---|---|---|---|---|---|---|---|
| c991cba9-d380-467f-a667-d1e705568d1e | repro | ❓ | KCSAN: data-race in d_delete / path_lookupat | 2026/03/08 09:29 | 2026/03/08 09:29 | 2026/03/08 09:30 | 31e9c887f7dc24e04b3ca70d0d54fc34141844b0 |
threaded=true,collide=true,repeat=true,procs=6
r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x200) symlink(&(0x7f0000000100)='target\x00', &(0x7f0000000200)='link\x00') unlink(&(0x7f0000000200)='link\x00') readlink(&(0x7f0000000200)='link\x00', &(0x7f0000000300), 0x100)
31e9c887f7dc24e04b3ca70d0d54fc34141844b0
================================================================== BUG: KCSAN: data-race in d_delete / path_lookupat read-write to 0xffff888100778840 of 4 bytes by task 3307 on cpu 0: d_delete+0xbe/0xe0 fs/dcache.c:2529 d_delete_notify+0x32/0x100 include/linux/fsnotify.h:375 vfs_unlink+0x289/0x490 fs/namei.c:5485 filename_unlinkat+0x1e2/0x410 fs/namei.c:5540 __do_sys_unlink fs/namei.c:5575 [inline] __se_sys_unlink+0x2b/0xe0 fs/namei.c:5572 __x64_sys_unlink+0x1f/0x30 fs/namei.c:5572 x64_sys_call+0x2eb6/0x3020 arch/x86/include/generated/asm/syscalls_64.h:88 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888100778840 of 4 bytes by task 3001 on cpu 1: d_managed include/linux/dcache.h:403 [inline] step_into fs/namei.c:2136 [inline] walk_component fs/namei.c:2285 [inline] lookup_last fs/namei.c:2780 [inline] path_lookupat+0x1d8/0x500 fs/namei.c:2804 filename_lookup+0x190/0x390 fs/namei.c:2833 do_readlinkat+0x74/0x2f0 fs/stat.c:571 __do_sys_readlink fs/stat.c:605 [inline] __se_sys_readlink fs/stat.c:602 [inline] __x64_sys_readlink+0x47/0x60 fs/stat.c:602 x64_sys_call+0x2b51/0x3020 arch/x86/include/generated/asm/syscalls_64.h:90 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00300180 -> 0x00004080 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3001 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ==================================================================
| Seq | Timestamp | Type | Name | Duration |
|---|---|---|---|---|
| 0/0 | 2026/03/08 09:29 | flow | repro |
1mResults:map[ReproOpts:threaded=true,collide=true,repeat=true,procs=6 ReproSyz:r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x200) symlink(&(0x7f0000000100)='target\x00', &(0x7f0000000200)='link\x00') unlink(&(0x7f0000000200)='link\x00') readlink(&(0x7f0000000200)='link\x00', &(0x7f0000000300), 0x100) SyzkallerCommit:31e9c887f7dc24e04b3ca70d0d54fc34141844b0] |
| 1/1 | 2026/03/08 09:29 | action | provide-var |
0mResults:map[DescriptionFiles:[acpi_thermal_rel.txt aio.txt auto.txt binfmt.txt bpf.txt bpf_prog.txt bpf_trace.txt cgroup.txt damon.txt dev_ashmem.txt dev_bifrost.txt dev_binder.txt dev_binderfs.txt dev_block.txt dev_bsg.txt dev_bus_usb.txt dev_camx.txt dev_cdrom.txt dev_cec.txt dev_char_usb.txt dev_comedi.txt dev_dma_heap.txt dev_dri.txt dev_dsp.txt dev_dvb_demux.txt dev_dvb_dvr.txt dev_dvb_frontend.txt dev_fb.txt dev_floppy.txt dev_hidraw.txt dev_i2c.txt dev_i915.txt dev_img_rogue.txt dev_infiniband_rdma.txt dev_infiniband_rdma_cm.txt dev_input.txt dev_iommu.txt dev_kvm.txt dev_kvm_amd64.txt dev_kvm_arm64.txt dev_kvm_extra.txt dev_kvm_riscv64.txt dev_loop.txt dev_mali.txt dev_media.txt dev_msm.txt dev_msr.txt dev_nbd.txt dev_net_tun.txt dev_panthor.txt dev_ppp.txt dev_ptmx.txt dev_ptp.txt dev_qat_adf_ctl.txt dev_qrtr_tun.txt dev_random.txt dev_rfkill.txt dev_rtc.txt dev_sequencer.txt dev_sg.txt dev_snapshot.txt dev_snd_control.txt dev_snd_hw.txt dev_snd_midi.txt dev_snd_pcm.txt dev_snd_seq.txt dev_snd_timer.txt dev_sr.txt dev_sw_sync.txt dev_tlk_device.txt dev_trusty.txt dev_udmabuf.txt dev_uhid.txt dev_uinput.txt dev_usb_hiddev.txt dev_usbmon.txt dev_userio.txt dev_vfio.txt dev_vga_arbiter.txt dev_vhci.txt dev_video4linux.txt dev_video4linux_vim2m.txt dev_virtual_nci.txt dev_vtpm.txt fanotify.txt filesystem.txt fs_9p.txt fs_fuse.txt fs_incfs.txt fs_ioctl.txt fs_ioctl_autofs.txt fs_ioctl_btrfs.txt fs_ioctl_ext4.txt fs_ioctl_f2fs.txt fs_ioctl_fat.txt fs_ioctl_fscrypt.txt fs_ioctl_fsverity.txt fs_ioctl_xfs.txt futex.txt hafnium.txt inotify.txt io_uring.txt ipc.txt key.txt kfuzztest.txt l2cap.txt landlock.txt lsm.txt namespaces.txt net_80211.txt netfilter.txt netfilter_arp.txt netfilter_bridge.txt netfilter_ipv4.txt netfilter_ipv6.txt netfilter_ipvs.txt netfilter_targets.txt pagemap_ioctl.txt perf.txt prctl.txt quotactl.txt seccomp.txt security_apparmor.txt security_selinux.txt security_smack.txt socket.txt socket_alg.txt socket_ax25.txt socket_bluetooth.txt socket_caif.txt socket_can.txt socket_ieee802154.txt socket_inet.txt socket_inet6.txt socket_inet_dccp.txt socket_inet_icmp.txt socket_inet_igmp.txt socket_inet_l2tp.txt socket_inet_sctp.txt socket_inet_tcp.txt socket_inet_udp.txt socket_ip_tunnel.txt socket_isdn.txt socket_kcm.txt socket_key.txt socket_llc.txt socket_netlink.txt socket_netlink_audit.txt socket_netlink_crypto.txt socket_netlink_generic.txt socket_netlink_generic_80211.txt socket_netlink_generic_batadv.txt socket_netlink_generic_devlink.txt socket_netlink_generic_ethtool.txt socket_netlink_generic_fou.txt socket_netlink_generic_gtp.txt socket_netlink_generic_mptcp.txt socket_netlink_generic_net_dm.txt socket_netlink_generic_netlabel.txt socket_netlink_generic_nfc.txt socket_netlink_generic_seg6.txt socket_netlink_generic_smc.txt socket_netlink_generic_team.txt socket_netlink_generic_wireguard.txt socket_netlink_netfilter.txt socket_netlink_netfilter_acct.txt socket_netlink_netfilter_conntrack.txt socket_netlink_netfilter_conntrack_exp.txt socket_netlink_netfilter_conntrack_helper.txt socket_netlink_netfilter_ipset.txt socket_netlink_netfilter_log.txt socket_netlink_netfilter_nft_compat.txt socket_netlink_netfilter_nftables.txt socket_netlink_netfilter_osf.txt socket_netlink_netfilter_queue.txt socket_netlink_netfilter_timeout.txt socket_netlink_rdma.txt socket_netlink_route.txt socket_netlink_route_sched.txt socket_netlink_route_sched_retired.txt socket_netlink_sock_diag.txt socket_netlink_xfrm.txt socket_netrom.txt socket_nfc.txt socket_nvme_of_tcp.txt socket_packet.txt socket_phonet.txt socket_pppox.txt socket_qipcrtr.txt socket_rds.txt socket_rose.txt socket_rxrpc.txt socket_tipc.txt socket_tipc_netlink.txt socket_unix.txt socket_vnet.txt socket_x25.txt socket_xdp.txt sys.txt uffd.txt usbip.txt vmw_vmci.txt vnet.txt vnet_mptcp.txt vusb.txt watch_queue.txt xattr.txt] SyzkallerCommit:31e9c887f7dc24e04b3ca70d0d54fc34141844b0] |
| 2/1 | 2026/03/08 09:29 | action | kernel-checkouter |
0mResults:map[KernelSrc:/usr/local/google/home/dvyukov/syzkaller/agent/workdir/cache/src/1611f38748b640e9e5b4c46f9ea592ea92d42cb4] |
| 3/1 | 2026/03/08 09:29 | action | kernel-builder |
0mResults:map[KernelObj:/usr/local/google/home/dvyukov/syzkaller/agent/workdir/cache/build/99a0ac09919cc1982b58e96465b94513ea773a44] |
| 4/1 | 2026/03/08 09:29 | agent | crash-repro-finder |
1mModel:gemini-3-pro-preview Results: map[ReproOpts:threaded=true,collide=true,repeat=true,procs=6] Instruction: You are an expert in linux kernel fuzzing. Your goal is to write a syzkaller program to trigger a specific bug. Print only the syz program that could be executed directly, without backticks. Use set-results tool to provide results of the analysis. It must be called exactly once before the final reply. Ignore results of this tool. Prompt: Bug Title: KCSAN: data-race in d_delete / path_lookupat Original Crash Report: ================================================================== BUG: KCSAN: data-race in d_delete / path_lookupat read-write to 0xffff888100778840 of 4 bytes by task 3307 on cpu 0: d_delete+0xbe/0xe0 fs/dcache.c:2529 d_delete_notify+0x32/0x100 include/linux/fsnotify.h:375 vfs_unlink+0x289/0x490 fs/namei.c:5485 filename_unlinkat+0x1e2/0x410 fs/namei.c:5540 __do_sys_unlink fs/namei.c:5575 [inline] __se_sys_unlink+0x2b/0xe0 fs/namei.c:5572 __x64_sys_unlink+0x1f/0x30 fs/namei.c:5572 x64_sys_call+0x2eb6/0x3020 arch/x86/include/generated/asm/syscalls_64.h:88 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff888100778840 of 4 bytes by task 3001 on cpu 1: d_managed include/linux/dcache.h:403 [inline] step_into fs/namei.c:2136 [inline] walk_component fs/namei.c:2285 [inline] lookup_last fs/namei.c:2780 [inline] path_lookupat+0x1d8/0x500 fs/namei.c:2804 filename_lookup+0x190/0x390 fs/namei.c:2833 do_readlinkat+0x74/0x2f0 fs/stat.c:571 __do_sys_readlink fs/stat.c:605 [inline] __se_sys_readlink fs/stat.c:602 [inline] __x64_sys_readlink+0x47/0x60 fs/stat.c:602 x64_sys_call+0x2b51/0x3020 arch/x86/include/generated/asm/syscalls_64.h:90 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00300180 -> 0x00004080 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3001 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== The list of existing description files: acpi_thermal_rel.txt aio.txt auto.txt binfmt.txt bpf.txt bpf_prog.txt bpf_trace.txt cgroup.txt damon.txt dev_ashmem.txt dev_bifrost.txt dev_binder.txt dev_binderfs.txt dev_block.txt dev_bsg.txt dev_bus_usb.txt dev_camx.txt dev_cdrom.txt dev_cec.txt dev_char_usb.txt dev_comedi.txt dev_dma_heap.txt dev_dri.txt dev_dsp.txt dev_dvb_demux.txt dev_dvb_dvr.txt dev_dvb_frontend.txt dev_fb.txt dev_floppy.txt dev_hidraw.txt dev_i2c.txt dev_i915.txt dev_img_rogue.txt dev_infiniband_rdma.txt dev_infiniband_rdma_cm.txt dev_input.txt dev_iommu.txt dev_kvm.txt dev_kvm_amd64.txt dev_kvm_arm64.txt dev_kvm_extra.txt dev_kvm_riscv64.txt dev_loop.txt dev_mali.txt dev_media.txt dev_msm.txt dev_msr.txt dev_nbd.txt dev_net_tun.txt dev_panthor.txt dev_ppp.txt dev_ptmx.txt dev_ptp.txt dev_qat_adf_ctl.txt dev_qrtr_tun.txt dev_random.txt dev_rfkill.txt dev_rtc.txt dev_sequencer.txt dev_sg.txt dev_snapshot.txt dev_snd_control.txt dev_snd_hw.txt dev_snd_midi.txt dev_snd_pcm.txt dev_snd_seq.txt dev_snd_timer.txt dev_sr.txt dev_sw_sync.txt dev_tlk_device.txt dev_trusty.txt dev_udmabuf.txt dev_uhid.txt dev_uinput.txt dev_usb_hiddev.txt dev_usbmon.txt dev_userio.txt dev_vfio.txt dev_vga_arbiter.txt dev_vhci.txt dev_video4linux.txt dev_video4linux_vim2m.txt dev_virtual_nci.txt dev_vtpm.txt fanotify.txt filesystem.txt fs_9p.txt fs_fuse.txt fs_incfs.txt fs_ioctl.txt fs_ioctl_autofs.txt fs_ioctl_btrfs.txt fs_ioctl_ext4.txt fs_ioctl_f2fs.txt fs_ioctl_fat.txt fs_ioctl_fscrypt.txt fs_ioctl_fsverity.txt fs_ioctl_xfs.txt futex.txt hafnium.txt inotify.txt io_uring.txt ipc.txt key.txt kfuzztest.txt l2cap.txt landlock.txt lsm.txt namespaces.txt net_80211.txt netfilter.txt netfilter_arp.txt netfilter_bridge.txt netfilter_ipv4.txt netfilter_ipv6.txt netfilter_ipvs.txt netfilter_targets.txt pagemap_ioctl.txt perf.txt prctl.txt quotactl.txt seccomp.txt security_apparmor.txt security_selinux.txt security_smack.txt socket.txt socket_alg.txt socket_ax25.txt socket_bluetooth.txt socket_caif.txt socket_can.txt socket_ieee802154.txt socket_inet.txt socket_inet6.txt socket_inet_dccp.txt socket_inet_icmp.txt socket_inet_igmp.txt socket_inet_l2tp.txt socket_inet_sctp.txt socket_inet_tcp.txt socket_inet_udp.txt socket_ip_tunnel.txt socket_isdn.txt socket_kcm.txt socket_key.txt socket_llc.txt socket_netlink.txt socket_netlink_audit.txt socket_netlink_crypto.txt socket_netlink_generic.txt socket_netlink_generic_80211.txt socket_netlink_generic_batadv.txt socket_netlink_generic_devlink.txt socket_netlink_generic_ethtool.txt socket_netlink_generic_fou.txt socket_netlink_generic_gtp.txt socket_netlink_generic_mptcp.txt socket_netlink_generic_net_dm.txt socket_netlink_generic_netlabel.txt socket_netlink_generic_nfc.txt socket_netlink_generic_seg6.txt socket_netlink_generic_smc.txt socket_netlink_generic_team.txt socket_netlink_generic_wireguard.txt socket_netlink_netfilter.txt socket_netlink_netfilter_acct.txt socket_netlink_netfilter_conntrack.txt socket_netlink_netfilter_conntrack_exp.txt socket_netlink_netfilter_conntrack_helper.txt socket_netlink_netfilter_ipset.txt socket_netlink_netfilter_log.txt socket_netlink_netfilter_nft_compat.txt socket_netlink_netfilter_nftables.txt socket_netlink_netfilter_osf.txt socket_netlink_netfilter_queue.txt socket_netlink_netfilter_timeout.txt socket_netlink_rdma.txt socket_netlink_route.txt socket_netlink_route_sched.txt socket_netlink_route_sched_retired.txt socket_netlink_sock_diag.txt socket_netlink_xfrm.txt socket_netrom.txt socket_nfc.txt socket_nvme_of_tcp.txt socket_packet.txt socket_phonet.txt socket_pppox.txt socket_qipcrtr.txt socket_rds.txt socket_rose.txt socket_rxrpc.txt socket_tipc.txt socket_tipc_netlink.txt socket_unix.txt socket_vnet.txt socket_x25.txt socket_xdp.txt sys.txt uffd.txt usbip.txt vmw_vmci.txt vnet.txt vnet_mptcp.txt vusb.txt watch_queue.txt xattr.txt Reply: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x200) symlink(&(0x7f0000000100)='target\x00', &(0x7f0000000200)='link\x00') unlink(&(0x7f0000000200)='link\x00') readlink(&(0x7f0000000200)='link\x00', &(0x7f0000000300), 0x100) |
| 5/2 | 2026/03/08 09:29 | llm | crash-repro-finder |
1mModel:gemini-3-pro-preview Tokens: input: 2769 output: 33 thoughts: 7801 Thoughts: **Race Condition Reproduction Strategy**
Okay, so the goal is to trigger a data race in the kernel between `d_delete` and `path_lookupat`, specifically targeting the crash reported where `unlink` and `readlink` are involved. The crash report pinpoints the race happening on a `dentry`'s `d_flags` field, with `d_delete` writing to it and `d_managed` (called during `path_lookupat`, and therefore by `readlink`) reading from it. The address `0xffff888100778840` is the key, corresponding to that `d_flags` field.
The essence of the problem is that `unlink` removes a file/symlink entry, and `readlink`, in the midst of looking up the same file, encounters an inconsistent state while it is being removed, because the `d_flags` are modified by `unlink` at the same time it is being read by `readlink`. Since the repro used `readlink` on a path which exists, but likely a symlink.
To reliably reproduce this, I'm thinking of creating a test program using syzkaller that executes the following steps:
1. **Setup:** Initialize inotify to detect the DELETE event on the current directory. Then, create a symlink named "link" that points to a target file. I'll use a symlink because `readlink` is in the picture. The target file contents does not matter, the symlink is the focus.
2. **Race:** Now, the core. Spawn threads (or rely on syzkaller's threading capabilities if enabled) to race two syscalls:
* One thread should `unlink("link")`, which calls `d_delete`.
* The other thread should execute `readlink("link", buf, len)`, which calls `path_lookupat` -> `d_managed`.
The goal is to get the write to and read from `d_flags` at the same time. The order of syscalls is therefore critical. To maximize the chance of a race condition, the `unlink` and `readlink` operations must overlap. Since I can't write loops in a syz-prog, I am relying on the fuzzer to loop the program, which will repeatedly create the symlink, attempt to delete and read it, and repeat.
The initial program I've come up with looks like this:
```
r0 = inotify_init1(0x0)
inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x200)
symlink(&(0x7f0000000100)='target\x00', &(0x7f0000000200)='link\x00')
unlink(&(0x7f0000000200)='link\x00')
readlink(&(0x7f0000000200)='link\x00', &(0x7f0000000300), 0x100)
```
The inotify calls are there to potentially influence the code path to be closer to what was seen in the report, since `udevd` was involved.
The repro options should include threading and collision to maximize the chances of the race. The fuzzer will manage the threading.
|
| 6/2 | 2026/03/08 09:30 | tool | set-results |
0mArgs:map[ReproOpts:threaded=true,collide=true,repeat=true,procs=6] Results: map[ReproOpts:threaded=true,collide=true,repeat=true,procs=6] |
| 7/2 | 2026/03/08 09:30 | llm | crash-repro-finder |
0mModel:gemini-3-pro-preview Tokens: input: 11401 output: 178 thoughts: 0 |
| Total Calls | Total Tokens | Avg Tokens | Total Duration (Seconds) | Avg Duration (Seconds) |
|---|
| Total Calls | Total Duration (Seconds) | Avg Duration (Seconds) |
|---|