syzbot |
sign-in | mailing list | source | docs | 🏰 |
| ID | Workflow | Result | Correct | Bug | Created | Started | Finished | Revision | Error |
|---|---|---|---|---|---|---|---|---|---|
| a0741bf4-ef63-405e-93ee-97475b6df3b8 | repro | ❓ | KCSAN: data-race in __xa_clear_mark / xas_find_marked (2) | 2026/03/07 06:26 | 2026/03/07 06:26 | 2026/03/07 06:28 | 31e9c887f7dc24e04b3ca70d0d54fc34141844b0 |
{"threaded":true,"repeat":true,"procs":4}r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, 0x0, 0x4000000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./mnt/file1\x00', 0x42, 0x1ff) fallocate(r1, 0x0, 0x0, 0x100000) write(r1, &(0x7f0000000400)='a', 0x100000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./mnt/file2\x00', 0x42, 0x1ff) fallocate(r2, 0x0, 0x0, 0x100000) write(r2, &(0x7f0000000400)='b', 0x100000) sync()
31e9c887f7dc24e04b3ca70d0d54fc34141844b0
================================================================== BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked read-write to 0xffff8881081c6908 of 8 bytes by task 50 on cpu 0: instrument_read_write include/linux/instrumented.h:56 [inline] __instrument_read_write_bitop include/asm-generic/bitops/instrumented-non-atomic.h:84 [inline] ___test_and_clear_bit include/asm-generic/bitops/instrumented-non-atomic.h:114 [inline] node_clear_mark lib/xarray.c:102 [inline] xas_clear_mark lib/xarray.c:922 [inline] __xa_clear_mark+0xf5/0x1e0 lib/xarray.c:2100 __folio_end_writeback+0xf4/0x360 mm/page-writeback.c:2948 folio_end_writeback_no_dropbehind+0x6d/0x1d0 mm/filemap.c:1661 folio_end_writeback+0x1c/0x70 mm/filemap.c:1687 ext4_finish_bio+0x459/0x8b0 fs/ext4/page-io.c:145 ext4_release_io_end+0x9f/0x1f0 fs/ext4/page-io.c:160 ext4_end_io_end+0x18d/0x240 fs/ext4/page-io.c:211 ext4_do_flush_completed_IO fs/ext4/page-io.c:291 [inline] ext4_end_io_rsv_work+0x15b/0x1f0 fs/ext4/page-io.c:306 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff8881081c6908 of 8 bytes by task 3858 on cpu 1: xas_find_chunk include/linux/xarray.h:1752 [inline] xas_find_marked+0x213/0x620 lib/xarray.c:1510 find_get_entry mm/filemap.c:2064 [inline] filemap_get_folios_tag+0xfa/0x510 mm/filemap.c:2332 __filemap_fdatawait_range mm/filemap.c:523 [inline] filemap_fdatawait_keep_errors+0x6c/0x190 mm/filemap.c:626 wait_sb_inodes fs/fs-writeback.c:2805 [inline] sync_inodes_sb+0x40e/0x4c0 fs/fs-writeback.c:2927 sync_inodes_one_sb+0x3d/0x50 fs/sync.c:77 __iterate_supers+0x110/0x220 fs/super.c:927 iterate_supers+0x1f/0x30 fs/super.c:942 ksys_sync fs/sync.c:102 [inline] __ia32_sys_sync+0x5c/0xb0 fs/sync.c:111 x64_sys_call+0x2f3a/0x3020 arch/x86/include/generated/asm/syscalls_64.h:163 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffe000000000 -> 0xfffffe0000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3858 Comm: syz.1.160 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ==================================================================
| Seq | Timestamp | Type | Name | Duration |
|---|---|---|---|---|
| 0/0 | 2026/03/07 06:26 | flow | repro |
1mResults:map[ReproOpts:{"threaded":true,"repeat":true,"procs":4} ReproSyz:r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, 0x0, 0x4000000)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./mnt/file1\x00', 0x42, 0x1ff)
fallocate(r1, 0x0, 0x0, 0x100000)
write(r1, &(0x7f0000000400)='a', 0x100000)
r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./mnt/file2\x00', 0x42, 0x1ff)
fallocate(r2, 0x0, 0x0, 0x100000)
write(r2, &(0x7f0000000400)='b', 0x100000)
sync() SyzkallerCommit:31e9c887f7dc24e04b3ca70d0d54fc34141844b0] |
| 1/1 | 2026/03/07 06:26 | action | provide-var |
0mResults:map[DescriptionFiles:[acpi_thermal_rel.txt aio.txt auto.txt binfmt.txt bpf.txt bpf_prog.txt bpf_trace.txt cgroup.txt damon.txt dev_ashmem.txt dev_bifrost.txt dev_binder.txt dev_binderfs.txt dev_block.txt dev_bsg.txt dev_bus_usb.txt dev_camx.txt dev_cdrom.txt dev_cec.txt dev_char_usb.txt dev_comedi.txt dev_dma_heap.txt dev_dri.txt dev_dsp.txt dev_dvb_demux.txt dev_dvb_dvr.txt dev_dvb_frontend.txt dev_fb.txt dev_floppy.txt dev_hidraw.txt dev_i2c.txt dev_i915.txt dev_img_rogue.txt dev_infiniband_rdma.txt dev_infiniband_rdma_cm.txt dev_input.txt dev_iommu.txt dev_kvm.txt dev_kvm_amd64.txt dev_kvm_arm64.txt dev_kvm_extra.txt dev_kvm_riscv64.txt dev_loop.txt dev_mali.txt dev_media.txt dev_msm.txt dev_msr.txt dev_nbd.txt dev_net_tun.txt dev_panthor.txt dev_ppp.txt dev_ptmx.txt dev_ptp.txt dev_qat_adf_ctl.txt dev_qrtr_tun.txt dev_random.txt dev_rfkill.txt dev_rtc.txt dev_sequencer.txt dev_sg.txt dev_snapshot.txt dev_snd_control.txt dev_snd_hw.txt dev_snd_midi.txt dev_snd_pcm.txt dev_snd_seq.txt dev_snd_timer.txt dev_sr.txt dev_sw_sync.txt dev_tlk_device.txt dev_trusty.txt dev_udmabuf.txt dev_uhid.txt dev_uinput.txt dev_usb_hiddev.txt dev_usbmon.txt dev_userio.txt dev_vfio.txt dev_vga_arbiter.txt dev_vhci.txt dev_video4linux.txt dev_video4linux_vim2m.txt dev_virtual_nci.txt dev_vtpm.txt fanotify.txt filesystem.txt fs_9p.txt fs_fuse.txt fs_incfs.txt fs_ioctl.txt fs_ioctl_autofs.txt fs_ioctl_btrfs.txt fs_ioctl_ext4.txt fs_ioctl_f2fs.txt fs_ioctl_fat.txt fs_ioctl_fscrypt.txt fs_ioctl_fsverity.txt fs_ioctl_xfs.txt futex.txt hafnium.txt inotify.txt io_uring.txt ipc.txt key.txt kfuzztest.txt l2cap.txt landlock.txt lsm.txt namespaces.txt net_80211.txt netfilter.txt netfilter_arp.txt netfilter_bridge.txt netfilter_ipv4.txt netfilter_ipv6.txt netfilter_ipvs.txt netfilter_targets.txt pagemap_ioctl.txt perf.txt prctl.txt quotactl.txt seccomp.txt security_apparmor.txt security_selinux.txt security_smack.txt socket.txt socket_alg.txt socket_ax25.txt socket_bluetooth.txt socket_caif.txt socket_can.txt socket_ieee802154.txt socket_inet.txt socket_inet6.txt socket_inet_dccp.txt socket_inet_icmp.txt socket_inet_igmp.txt socket_inet_l2tp.txt socket_inet_sctp.txt socket_inet_tcp.txt socket_inet_udp.txt socket_ip_tunnel.txt socket_isdn.txt socket_kcm.txt socket_key.txt socket_llc.txt socket_netlink.txt socket_netlink_audit.txt socket_netlink_crypto.txt socket_netlink_generic.txt socket_netlink_generic_80211.txt socket_netlink_generic_batadv.txt socket_netlink_generic_devlink.txt socket_netlink_generic_ethtool.txt socket_netlink_generic_fou.txt socket_netlink_generic_gtp.txt socket_netlink_generic_mptcp.txt socket_netlink_generic_net_dm.txt socket_netlink_generic_netlabel.txt socket_netlink_generic_nfc.txt socket_netlink_generic_seg6.txt socket_netlink_generic_smc.txt socket_netlink_generic_team.txt socket_netlink_generic_wireguard.txt socket_netlink_netfilter.txt socket_netlink_netfilter_acct.txt socket_netlink_netfilter_conntrack.txt socket_netlink_netfilter_conntrack_exp.txt socket_netlink_netfilter_conntrack_helper.txt socket_netlink_netfilter_ipset.txt socket_netlink_netfilter_log.txt socket_netlink_netfilter_nft_compat.txt socket_netlink_netfilter_nftables.txt socket_netlink_netfilter_osf.txt socket_netlink_netfilter_queue.txt socket_netlink_netfilter_timeout.txt socket_netlink_rdma.txt socket_netlink_route.txt socket_netlink_route_sched.txt socket_netlink_route_sched_retired.txt socket_netlink_sock_diag.txt socket_netlink_xfrm.txt socket_netrom.txt socket_nfc.txt socket_nvme_of_tcp.txt socket_packet.txt socket_phonet.txt socket_pppox.txt socket_qipcrtr.txt socket_rds.txt socket_rose.txt socket_rxrpc.txt socket_tipc.txt socket_tipc_netlink.txt socket_unix.txt socket_vnet.txt socket_x25.txt socket_xdp.txt sys.txt uffd.txt usbip.txt vmw_vmci.txt vnet.txt vnet_mptcp.txt vusb.txt watch_queue.txt xattr.txt] SyzkallerCommit:31e9c887f7dc24e04b3ca70d0d54fc34141844b0] |
| 2/1 | 2026/03/07 06:26 | action | kernel-checkouter |
0mResults:map[KernelSrc:/usr/local/google/home/dvyukov/syzkaller/agent/workdir/cache/src/ec9e25b392423d2a117ee1d291abb801b14e649f] |
| 3/1 | 2026/03/07 06:26 | action | kernel-builder |
0mResults:map[KernelObj:/usr/local/google/home/dvyukov/syzkaller/agent/workdir/cache/build/0fc06b791fdc481cc2c430878c0d2566cf03f0d3] |
| 4/1 | 2026/03/07 06:26 | agent | crash-repro-finder |
1mModel:gemini-3-pro-preview Results: map[ReproOpts:{"threaded":true,"repeat":true,"procs":4}]Instruction: You are an expert in linux kernel fuzzing. Your goal is to write a syzkaller program to trigger a specific bug. Print only the syz program that could be executed directly, without backticks. Use set-results tool to provide results of the analysis. It must be called exactly once before the final reply. Ignore results of this tool. Prompt: Bug Title: KCSAN: data-race in __xa_clear_mark / xas_find_marked Original Crash Report: ================================================================== BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked read-write to 0xffff8881081c6908 of 8 bytes by task 50 on cpu 0: instrument_read_write include/linux/instrumented.h:56 [inline] __instrument_read_write_bitop include/asm-generic/bitops/instrumented-non-atomic.h:84 [inline] ___test_and_clear_bit include/asm-generic/bitops/instrumented-non-atomic.h:114 [inline] node_clear_mark lib/xarray.c:102 [inline] xas_clear_mark lib/xarray.c:922 [inline] __xa_clear_mark+0xf5/0x1e0 lib/xarray.c:2100 __folio_end_writeback+0xf4/0x360 mm/page-writeback.c:2948 folio_end_writeback_no_dropbehind+0x6d/0x1d0 mm/filemap.c:1661 folio_end_writeback+0x1c/0x70 mm/filemap.c:1687 ext4_finish_bio+0x459/0x8b0 fs/ext4/page-io.c:145 ext4_release_io_end+0x9f/0x1f0 fs/ext4/page-io.c:160 ext4_end_io_end+0x18d/0x240 fs/ext4/page-io.c:211 ext4_do_flush_completed_IO fs/ext4/page-io.c:291 [inline] ext4_end_io_rsv_work+0x15b/0x1f0 fs/ext4/page-io.c:306 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff8881081c6908 of 8 bytes by task 3858 on cpu 1: xas_find_chunk include/linux/xarray.h:1752 [inline] xas_find_marked+0x213/0x620 lib/xarray.c:1510 find_get_entry mm/filemap.c:2064 [inline] filemap_get_folios_tag+0xfa/0x510 mm/filemap.c:2332 __filemap_fdatawait_range mm/filemap.c:523 [inline] filemap_fdatawait_keep_errors+0x6c/0x190 mm/filemap.c:626 wait_sb_inodes fs/fs-writeback.c:2805 [inline] sync_inodes_sb+0x40e/0x4c0 fs/fs-writeback.c:2927 sync_inodes_one_sb+0x3d/0x50 fs/sync.c:77 __iterate_supers+0x110/0x220 fs/super.c:927 iterate_supers+0x1f/0x30 fs/super.c:942 ksys_sync fs/sync.c:102 [inline] __ia32_sys_sync+0x5c/0xb0 fs/sync.c:111 x64_sys_call+0x2f3a/0x3020 arch/x86/include/generated/asm/syscalls_64.h:163 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0xffffffe000000000 -> 0xfffffe0000000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3858 Comm: syz.1.160 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== The list of existing description files: acpi_thermal_rel.txt aio.txt auto.txt binfmt.txt bpf.txt bpf_prog.txt bpf_trace.txt cgroup.txt damon.txt dev_ashmem.txt dev_bifrost.txt dev_binder.txt dev_binderfs.txt dev_block.txt dev_bsg.txt dev_bus_usb.txt dev_camx.txt dev_cdrom.txt dev_cec.txt dev_char_usb.txt dev_comedi.txt dev_dma_heap.txt dev_dri.txt dev_dsp.txt dev_dvb_demux.txt dev_dvb_dvr.txt dev_dvb_frontend.txt dev_fb.txt dev_floppy.txt dev_hidraw.txt dev_i2c.txt dev_i915.txt dev_img_rogue.txt dev_infiniband_rdma.txt dev_infiniband_rdma_cm.txt dev_input.txt dev_iommu.txt dev_kvm.txt dev_kvm_amd64.txt dev_kvm_arm64.txt dev_kvm_extra.txt dev_kvm_riscv64.txt dev_loop.txt dev_mali.txt dev_media.txt dev_msm.txt dev_msr.txt dev_nbd.txt dev_net_tun.txt dev_panthor.txt dev_ppp.txt dev_ptmx.txt dev_ptp.txt dev_qat_adf_ctl.txt dev_qrtr_tun.txt dev_random.txt dev_rfkill.txt dev_rtc.txt dev_sequencer.txt dev_sg.txt dev_snapshot.txt dev_snd_control.txt dev_snd_hw.txt dev_snd_midi.txt dev_snd_pcm.txt dev_snd_seq.txt dev_snd_timer.txt dev_sr.txt dev_sw_sync.txt dev_tlk_device.txt dev_trusty.txt dev_udmabuf.txt dev_uhid.txt dev_uinput.txt dev_usb_hiddev.txt dev_usbmon.txt dev_userio.txt dev_vfio.txt dev_vga_arbiter.txt dev_vhci.txt dev_video4linux.txt dev_video4linux_vim2m.txt dev_virtual_nci.txt dev_vtpm.txt fanotify.txt filesystem.txt fs_9p.txt fs_fuse.txt fs_incfs.txt fs_ioctl.txt fs_ioctl_autofs.txt fs_ioctl_btrfs.txt fs_ioctl_ext4.txt fs_ioctl_f2fs.txt fs_ioctl_fat.txt fs_ioctl_fscrypt.txt fs_ioctl_fsverity.txt fs_ioctl_xfs.txt futex.txt hafnium.txt inotify.txt io_uring.txt ipc.txt key.txt kfuzztest.txt l2cap.txt landlock.txt lsm.txt namespaces.txt net_80211.txt netfilter.txt netfilter_arp.txt netfilter_bridge.txt netfilter_ipv4.txt netfilter_ipv6.txt netfilter_ipvs.txt netfilter_targets.txt pagemap_ioctl.txt perf.txt prctl.txt quotactl.txt seccomp.txt security_apparmor.txt security_selinux.txt security_smack.txt socket.txt socket_alg.txt socket_ax25.txt socket_bluetooth.txt socket_caif.txt socket_can.txt socket_ieee802154.txt socket_inet.txt socket_inet6.txt socket_inet_dccp.txt socket_inet_icmp.txt socket_inet_igmp.txt socket_inet_l2tp.txt socket_inet_sctp.txt socket_inet_tcp.txt socket_inet_udp.txt socket_ip_tunnel.txt socket_isdn.txt socket_kcm.txt socket_key.txt socket_llc.txt socket_netlink.txt socket_netlink_audit.txt socket_netlink_crypto.txt socket_netlink_generic.txt socket_netlink_generic_80211.txt socket_netlink_generic_batadv.txt socket_netlink_generic_devlink.txt socket_netlink_generic_ethtool.txt socket_netlink_generic_fou.txt socket_netlink_generic_gtp.txt socket_netlink_generic_mptcp.txt socket_netlink_generic_net_dm.txt socket_netlink_generic_netlabel.txt socket_netlink_generic_nfc.txt socket_netlink_generic_seg6.txt socket_netlink_generic_smc.txt socket_netlink_generic_team.txt socket_netlink_generic_wireguard.txt socket_netlink_netfilter.txt socket_netlink_netfilter_acct.txt socket_netlink_netfilter_conntrack.txt socket_netlink_netfilter_conntrack_exp.txt socket_netlink_netfilter_conntrack_helper.txt socket_netlink_netfilter_ipset.txt socket_netlink_netfilter_log.txt socket_netlink_netfilter_nft_compat.txt socket_netlink_netfilter_nftables.txt socket_netlink_netfilter_osf.txt socket_netlink_netfilter_queue.txt socket_netlink_netfilter_timeout.txt socket_netlink_rdma.txt socket_netlink_route.txt socket_netlink_route_sched.txt socket_netlink_route_sched_retired.txt socket_netlink_sock_diag.txt socket_netlink_xfrm.txt socket_netrom.txt socket_nfc.txt socket_nvme_of_tcp.txt socket_packet.txt socket_phonet.txt socket_pppox.txt socket_qipcrtr.txt socket_rds.txt socket_rose.txt socket_rxrpc.txt socket_tipc.txt socket_tipc_netlink.txt socket_unix.txt socket_vnet.txt socket_x25.txt socket_xdp.txt sys.txt uffd.txt usbip.txt vmw_vmci.txt vnet.txt vnet_mptcp.txt vusb.txt watch_queue.txt xattr.txt Reply: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, 0x0, 0x4000000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./mnt/file1\x00', 0x42, 0x1ff) fallocate(r1, 0x0, 0x0, 0x100000) write(r1, &(0x7f0000000400)='a', 0x100000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./mnt/file2\x00', 0x42, 0x1ff) fallocate(r2, 0x0, 0x0, 0x100000) write(r2, &(0x7f0000000400)='b', 0x100000) sync() |
| 5/2 | 2026/03/07 06:26 | llm | crash-repro-finder |
1mModel:gemini-3-pro-preview Tokens: input: 3141 output: 31 thoughts: 10397 Thoughts: **Data Race Reproduction Plan for ext4 Writeback and Sync** Okay, so the goal is to trigger a data race between `__xa_clear_mark` and `xas_find_marked` within the ext4 filesystem. The crash report pinpoints this happening during writeback completion (`ext4_finish_bio` from `folio_end_writeback`) and `sys_sync` (via `wait_sb_inodes` and `xas_find_marked`). The key is understanding the interaction of writes, IO completion and sync within the ext4 page cache (xarray). To reproduce this, I'm thinking I need to set up the following steps in a syzkaller program. First, I'll use `syz_mount_image$ext4` to mount an ext4 filesystem. It'll create a loop device. Then I'll open a file (`./mnt/file1` and `./mnt/file2`) on that mount. Next, I plan to write large amounts of data to these files. This will dirty pages in memory and trigger writeback activity that, in turn will call `ext4_finish_bio`. I'll use `fallocate` before each write to create unwritten extents to make the `ext4_end_io_rsv_work` trigger. Finally, I'll call `sync()`. This will concurrently trigger the second part of the race condition (`xas_find_marked`). I'm aiming for the IO completion from the write to occur while `sync` is iterating, and waiting for IO completion. I am using `syz_mount_image`, then `openat`, then two `fallocate` calls, then two `write` calls. The first `write` call uses the same memory address as the second. Finally, I end with a `sync()` call. I'm using `0x42` (O_RDWR|O_CREAT) for the `openat` flags and `0x1ff` for the mode. The key is to get enough dirty pages, via the `fallocate` and `write` sequence, so there is sufficient IO and the xarray marks are set, so that `sync` will have an increased chance of the race condition. The final program looks like this: ``` r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./mnt\x00', 0x0, 0x0, 0x0, 0x4000000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./mnt/file1\x00', 0x42, 0x1ff) fallocate(r1, 0x0, 0x0, 0x100000) write(r1, &(0x7f0000000400)='a', 0x100000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./mnt/file2\x00', 0x42, 0x1ff) fallocate(r2, 0x0, 0x0, 0x100000) write(r2, &(0x7f0000000400)='b', 0x100000) sync() ``` To maximize the chance of triggering the race condition I need to use `threaded = true` to get two parallel flows happening, and `repeat = true` to allow multiple tests, and use `procs = 4` to enhance the chance of concurrency. The crash report said the race happened between a kworker and the syz executor. I'm pretty sure I have constructed the right sequence here to trigger this race. The `syz_mount_image` will handle the setup of the loop device and the ext4 mount. |
| 6/2 | 2026/03/07 06:28 | tool | set-results |
0mArgs:map[ReproOpts:{"threaded":true,"repeat":true,"procs":4}]Results: map[ReproOpts:{"threaded":true,"repeat":true,"procs":4}] |
| 7/2 | 2026/03/07 06:28 | llm | crash-repro-finder |
0mModel:gemini-3-pro-preview Tokens: input: 14521 output: 318 thoughts: 0 |
| Total Calls | Total Tokens | Avg Tokens | Total Duration (Seconds) | Avg Duration (Seconds) |
|---|
| Total Calls | Total Duration (Seconds) | Avg Duration (Seconds) |
|---|