I0723 06:04:50.044398 16862 x:0] *************************** I0723 06:04:50.044734 16862 x:0] Args: [/syzkaller/managers/ptrace-proxy-sandbox-race/current/image -root /syzkaller/managers/ptrace-proxy-sandbox-race/workdir/gvisor_root -watchdog-action=panic -network=none -platform=ptrace -file-access=proxy -network=sandbox exec -user=0:0 -cap CAP_CHOWN -cap CAP_DAC_OVERRIDE -cap CAP_DAC_READ_SEARCH -cap CAP_FOWNER -cap CAP_FSETID -cap CAP_KILL -cap CAP_SETGID -cap CAP_SETUID -cap CAP_SETPCAP -cap CAP_LINUX_IMMUTABLE -cap CAP_NET_BIND_SERVICE -cap CAP_NET_BROADCAST -cap CAP_NET_ADMIN -cap CAP_NET_RAW -cap CAP_IPC_LOCK -cap CAP_IPC_OWNER -cap CAP_SYS_MODULE -cap CAP_SYS_RAWIO -cap CAP_SYS_CHROOT -cap CAP_SYS_PTRACE -cap CAP_SYS_PACCT -cap CAP_SYS_ADMIN -cap CAP_SYS_BOOT -cap CAP_SYS_NICE -cap CAP_SYS_RESOURCE -cap CAP_SYS_TIME -cap CAP_SYS_TTY_CONFIG -cap CAP_MKNOD -cap CAP_LEASE -cap CAP_AUDIT_WRITE -cap CAP_AUDIT_CONTROL -cap CAP_SETFCAP -cap CAP_MAC_OVERRIDE -cap CAP_MAC_ADMIN -cap CAP_SYSLOG -cap CAP_WAKE_ALARM -cap CAP_BLOCK_SUSPEND -cap CAP_AUDIT_READ ci-gvisor-ptrace-proxy-sandbox-race-3 /syz-fuzzer -executor=/syz-executor -name=vm-3 -arch=amd64 -manager=stdin -sandbox=none -procs=4 -v=0 -cover=false -debug=false -test=false] I0723 06:04:50.045149 16862 x:0] Git Revision: 72627b310e89405fb0215d773405d73f305de993 I0723 06:04:50.045316 16862 x:0] PID: 16862 I0723 06:04:50.045437 16862 x:0] UID: 0, GID: 0 I0723 06:04:50.045545 16862 x:0] Configuration: I0723 06:04:50.045654 16862 x:0] RootDir: /syzkaller/managers/ptrace-proxy-sandbox-race/workdir/gvisor_root I0723 06:04:50.045862 16862 x:0] Platform: ptrace I0723 06:04:50.045998 16862 x:0] FileAccess: proxy, overlay: false I0723 06:04:50.046126 16862 x:0] Network: sandbox, logging: false I0723 06:04:50.046287 16862 x:0] Strace: false, max size: 1024, syscalls: [] I0723 06:04:50.046430 16862 x:0] *************************** I0723 06:04:50.101608 16798 x:0] EXEC: [/syz-fuzzer -executor=/syz-executor -name=vm-3 -arch=amd64 -manager=stdin -sandbox=none -procs=4 -v=0 -cover=false -debug=false -test=false] 2018/07/23 06:04:50 fuzzer started 2018/07/23 06:04:54 dialing manager at stdin 2018/07/23 06:04:54 syscalls: 774 2018/07/23 06:04:54 code coverage: debugfs is not enabled or not mounted 2018/07/23 06:04:54 comparison tracing: debugfs is not enabled or not mounted 2018/07/23 06:04:54 setuid sandbox: enabled 2018/07/23 06:04:54 namespace sandbox: enabled 2018/07/23 06:04:54 fault injection: CONFIG_FAULT_INJECTION is not enabled 2018/07/23 06:04:54 leak checking: debugfs is not enabled or not mounted 2018/07/23 06:04:54 net packed injection: /dev/net/tun does not exist 2018/07/23 06:04:54 net device setup: ip command is not found 06:05:15 executing program 0: syz_open_procfs(0x0, &(0x7f0000000540)="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") 06:05:15 executing program 1: ptrace$poke(0x4, 0x0, &(0x7f0000000100), 0x0) 06:05:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="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") pread64(r0, &(0x7f0000000440)=""/123, 0xfffffffffffffeef, 0x0) 06:05:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'tunl0\x00', &(0x7f00000000c0)=ANY=[]}) 06:05:16 executing program 0: r0 = socket(0x1e, 0x805, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000080)=@nl=@proc, &(0x7f0000000100)=0x80) 06:05:16 executing program 1: close(0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000140), 0x14) 06:05:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$unix(0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040), 0x10) 06:05:16 executing program 2: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x80440, 0x0) close(r0) socket$unix(0x1, 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) write$P9_RXATTRCREATE(r1, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)={0x303, 0x33}, 0x4) 06:05:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) r2 = openat(r0, &(0x7f0000000200)='./file0\x00', 0x20000, 0xfffffffffffffffe) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x4) close(r2) socket$unix(0x1, 0x2, 0x0) getsockname(r2, &(0x7f0000000180)=@in={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 06:05:16 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0x43, 0x9}, 0x43) 06:05:16 executing program 1: socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socket$unix(0x1, 0x2, 0x0) write$eventfd(r1, &(0x7f0000000440), 0x8) 06:05:16 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x202100, 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x7, 0xfffffffffffffff9, 0x5}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) close(r1) r2 = socket$unix(0x1, 0xfffffffffffffffd, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000040)=0x5) 06:05:16 executing program 3: socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/218, 0xda}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000000240)=""/211, 0xd3}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000003080)=""/4096, 0x1000}, {&(0x7f0000000040)}, {&(0x7f0000000080)=""/1, 0x1}], 0x7, 0x0) listen(r0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x2a917c99) r1 = accept4$inet(r0, &(0x7f0000000bc0)={0x0, 0x0, @remote}, &(0x7f0000000c00)=0x10, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000), 0x10) 06:05:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000080)=""/14, 0xe}], 0x1) ioctl$TCSETAF(r1, 0x5401, &(0x7f00000000c0)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x447fa, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) dup3(r3, r2, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000)={0x303, 0x33}, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000, 0x0) ioctl(r0, 0x5, &(0x7f0000000340)="a2d3e0373a5d868e24c4bb7c2970ffa266d41181744b3c6ccadfdb01d930589ec6db9d145c87550ef09be2d92b7921f406ff2127586a9f5f9100cab8544b7e4daacd02b4a5c53edcf53e8beecaaeab70a22fe757c96fb5ddd447e0194cafa10e8c817babefd0413ab5b52da61a78c5d54a8a8a133b2806bf521e841345f2ba54e4bb3c2a410ab81d36e8397256cbd3e988d3f80e2b18f3380eb2ae21abc9c03232ed6170e9ed613447e7efb9e51c41c8363ce33966f90b559d50144a74210cdf0a47f5945e1f381ed79971a44b83cc278c290a1bcda3cd9ee5b44e2f8cb69c496a68e856ce51c4b1bd3824b1a30c774533bfaf7dc22d4dd51f0fa3516e69fd89ae2dacadf1d454a6e790d00cb65ffe6fed77952184b9c8f98f15c81cd0477ac6b592ba71ceae9766d6c654a27143a8bdbdf0a9c614b77f97a631da3d832b7fe931c66bd404c15d842bd29a1ec383707b96ed4734c32ed433a4ca697eaaede738b50a91bd00966669f259599a9493c054b7635389048fb4cd68c740e01f815d86f4c55810e3ad8f4ff91053ebf1480d93596ead9e79ec2062c05d1119f1c427fbdabc37e591775a96d50c31a8f4ce") 06:05:16 executing program 1: r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='bond_slave_0\x00', 0x6}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000c0, 0x0) close(r2) dup3(r2, r1, 0x1000000) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000180)=@generic={0x1, 0xfffffffffffffffb, 0x3}) socket$inet_udp(0x2, 0x2, 0x0) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000140)=0xc) 06:05:17 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) r2 = accept4(r1, &(0x7f0000000240)=@sco, &(0x7f00000002c0)=0x80, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) getpeername$netlink(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000140)={0x303, 0x33}, 0x4) r3 = open(&(0x7f0000000000)="e91f7189591e9233614b00", 0x4000, 0x7f) r4 = semget(0x2, 0x1, 0x2) semctl$IPC_INFO(r4, 0x3, 0x3, &(0x7f0000000300)=""/123) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000100)) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f00000000c0)=""/45) 06:05:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = dup2(r0, r1) recvfrom$inet6(r2, &(0x7f00000001c0), 0x0, 0x20, 0x0, 0xffffffffffffffba) fstatfs(r1, &(0x7f0000000100)=""/27) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x9, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 06:05:17 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0xfffffffffffffdbd, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000380)={@multicast2=0xe0000002, @loopback=0x7f000001, r1}, 0xc) fcntl$setflags(r0, 0x2, 0x1) prlimit64(0x0, 0x7, &(0x7f00000000c0)={0xfffffffffffffffe}, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 06:05:17 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000440)=ANY=[@ANYBLOB="e00000017f00000148624ab4dcdf8fb0"], 0x10) getpeername(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'bridge_slave_0\x00', 0x1}, 0x18) 06:05:17 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000080)="126e50cf", 0x4) 06:05:17 executing program 3: statfs(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100)=""/220) creat(&(0x7f0000000080)='./file1\x00', 0x8) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') llistxattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ================== WARNING: DATA RACE Write at 0x00c4203d7028 by goroutine 432: gvisor.googlesource.com/gvisor/pkg/waiter.(*Entry).SetPrev() bazel-out/k8-fastbuild/bin/pkg/ilist/interface_list.go:165 +0x50 gvisor.googlesource.com/gvisor/pkg/ilist.(*List).Remove() bazel-out/k8-fastbuild/bin/pkg/ilist/interface_list.go:134 +0xc8 gvisor.googlesource.com/gvisor/pkg/waiter.(*Queue).EventUnregister() pkg/waiter/waiter.go:177 +0x67 gvisor.googlesource.com/gvisor/pkg/sentry/fs/tty.(*slaveFileOperations).EventUnregister() pkg/sentry/fs/tty/slave.go:115 +0xfb gvisor.googlesource.com/gvisor/pkg/sentry/fs.(*File).EventUnregister() pkg/sentry/fs/file.go:180 +0x60 gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.readv() pkg/sentry/syscalls/linux/sys_read.go:223 +0x5e1 gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.Readv() pkg/sentry/syscalls/linux/sys_read.go:144 +0x28c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:162 +0x14e gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:278 +0x7d gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:241 +0xc3 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:216 +0x19c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:217 +0x1501 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:95 +0x264 Previous read at 0x00c4203d7028 by goroutine 391: gvisor.googlesource.com/gvisor/pkg/waiter.(*Entry).Prev() bazel-out/k8-fastbuild/bin/pkg/ilist/interface_list.go:155 +0x4c gvisor.googlesource.com/gvisor/pkg/ilist.(*List).Remove() bazel-out/k8-fastbuild/bin/pkg/ilist/interface_list.go:124 +0x42 gvisor.googlesource.com/gvisor/pkg/waiter.(*Queue).EventUnregister() pkg/waiter/waiter.go:177 +0x67 gvisor.googlesource.com/gvisor/pkg/sentry/fs/tty.(*slaveFileOperations).EventUnregister() pkg/sentry/fs/tty/slave.go:114 +0x96 gvisor.googlesource.com/gvisor/pkg/sentry/fs.(*File).EventUnregister() pkg/sentry/fs/file.go:180 +0x60 gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.readv() pkg/sentry/syscalls/linux/sys_read.go:223 +0x5e1 gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.Readv() pkg/sentry/syscalls/linux/sys_read.go:144 +0x28c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:162 +0x14e gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:278 +0x7d gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:241 +0xc3 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:216 +0x19c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:217 +0x1501 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:95 +0x264 Goroutine 432 (running) created at: gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:258 +0x193 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).Clone() pkg/sentry/kernel/task_clone.go:316 +0x110a gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:157 +0x22e gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_thread.go:171 +0x80 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:162 +0x14e gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:278 +0x7d gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:241 +0xc3 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:216 +0x19c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:217 +0x1501 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:95 +0x264 Goroutine 391 (running) created at: gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).Start() pkg/sentry/kernel/task_start.go:258 +0x193 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).Clone() pkg/sentry/kernel/task_clone.go:316 +0x110a gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.clone() pkg/sentry/syscalls/linux/sys_thread.go:157 +0x22e gvisor.googlesource.com/gvisor/pkg/sentry/syscalls/linux.Clone() pkg/sentry/syscalls/linux/sys_thread.go:171 +0x80 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).executeSyscall() pkg/sentry/kernel/task_syscall.go:162 +0x14e gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke() pkg/sentry/kernel/task_syscall.go:278 +0x7d gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter() pkg/sentry/kernel/task_syscall.go:241 +0xc3 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).doSyscall() pkg/sentry/kernel/task_syscall.go:216 +0x19c gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*runApp).execute() pkg/sentry/kernel/task_run.go:217 +0x1501 gvisor.googlesource.com/gvisor/pkg/sentry/kernel.(*Task).run() pkg/sentry/kernel/task_run.go:95 +0x264 ================== W0723 06:05:18.493402 16773 x:0] FATAL ERROR: error running container: error waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-3": EOF error running container: error waiting on container "ci-gvisor-ptrace-proxy-sandbox-race-3": EOF W0723 06:05:18.493363 16862 x:0] FATAL ERROR: error getting processes for container: error executing in sandbox: EOF error getting processes for container: error executing in sandbox: EOF