I0829 05:18:31.854590 35464 x:0] *************************** I0829 05:18:31.854707 35464 x:0] Args: [/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/image -root /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -alsologtostderr -platform=ptrace -file-access=exclusive -overlay -network=host run -bundle /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/bundle ci-gvisor-kvm-direct-overlay-host-race-test-2] I0829 05:18:31.855008 35464 x:0] Version {VERSION} I0829 05:18:31.855100 35464 x:0] PID: 35464 I0829 05:18:31.855171 35464 x:0] UID: 0, GID: 0 I0829 05:18:31.855306 35464 x:0] Configuration: I0829 05:18:31.855358 35464 x:0] RootDir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root I0829 05:18:31.855434 35464 x:0] Platform: ptrace I0829 05:18:31.855499 35464 x:0] FileAccess: exclusive, overlay: true I0829 05:18:31.855606 35464 x:0] Network: host, logging: false I0829 05:18:31.855950 35464 x:0] Strace: false, max size: 1024, syscalls: [] I0829 05:18:31.856041 35464 x:0] *************************** D0829 05:18:31.871557 35464 x:0] Spec: &{Version: Process:0xc0002892b0 Root:0xc0002a8e00 Hostname: Mounts:[] Hooks: Annotations:map[] Linux: Solaris: Windows:} D0829 05:18:31.872102 35464 x:0] Spec.Hooks: D0829 05:18:31.872192 35464 x:0] Spec.Linux: D0829 05:18:31.872293 35464 x:0] Spec.Process: &{Terminal:false ConsoleSize: User:{UID:0 GID:0 AdditionalGids:[] Username:} Args:[/init] Env:[SYZ_GVISOR_PROXY=1] Cwd:/tmp Capabilities:0xc000148380 Rlimits:[] NoNewPrivileges:false ApparmorProfile: OOMScoreAdj: SelinuxLabel:} D0829 05:18:31.872558 35464 x:0] Spec.Root: &{Path:/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/image Readonly:true} D0829 05:18:31.872717 35464 x:0] Spec.Mounts: [] D0829 05:18:31.872799 35464 x:0] Run container "ci-gvisor-kvm-direct-overlay-host-race-test-2" in root dir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root D0829 05:18:31.872886 35464 x:0] Create container "ci-gvisor-kvm-direct-overlay-host-race-test-2" in root dir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root D0829 05:18:31.873409 35464 x:0] Creating new sandbox for container "ci-gvisor-kvm-direct-overlay-host-race-test-2" D0829 05:18:31.875519 35464 x:0] Starting gofer: /proc/self/exe [--root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true gofer --bundle /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/bundle --panic-on-write=true --spec-fd=3 --mounts-fd=4 --io-fds=5] I0829 05:18:31.898664 35464 x:0] Gofer started, PID: 35544 I0829 05:18:31.899398 35464 x:0] Creating sandbox process with addr: runsc-sandbox.ci-gvisor-kvm-direct-overlay-host-race-test-2 I0829 05:18:31.899556 35464 x:0] Sandbox will be started in new mount, IPC and UTS namespaces I0829 05:18:31.899607 35464 x:0] Sandbox will be started in the current PID namespace I0829 05:18:31.899672 35464 x:0] Sandbox will be started in the host network namespace I0829 05:18:31.899698 35464 x:0] Sandbox will be started in the current user namespace I0829 05:18:31.900011 35464 x:0] Sandbox will be started in minimal chroot D0829 05:18:31.900064 35464 x:0] Donating FD 3: "control_server_socket" D0829 05:18:31.900122 35464 x:0] Donating FD 4: "|0" D0829 05:18:31.900179 35464 x:0] Donating FD 5: "/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/bundle/config.json" D0829 05:18:31.900298 35464 x:0] Donating FD 6: "|1" D0829 05:18:31.900357 35464 x:0] Donating FD 7: "sandbox IO FD" D0829 05:18:31.900399 35464 x:0] Donating FD 8: "/dev/stdin" D0829 05:18:31.900456 35464 x:0] Donating FD 9: "/dev/stdout" D0829 05:18:31.900502 35464 x:0] Donating FD 10: "/dev/stderr" D0829 05:18:31.900546 35464 x:0] Starting sandbox: /proc/self/exe [runsc-sandbox --root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true --panic-signal=15 boot --bundle=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/bundle --controller-fd=3 --mounts-fd=4 --spec-fd=5 --start-sync-fd=6 --io-fds=7 --stdio-fds=8 --stdio-fds=9 --stdio-fds=10 --apply-caps=true --setup-root ci-gvisor-kvm-direct-overlay-host-race-test-2] D0829 05:18:31.900823 35464 x:0] SysProcAttr: &{Chroot: Credential: Ptrace:false Setsid:true Setpgid:false Setctty:false Noctty:false Ctty:0 Foreground:false Pgid:0 Pdeathsig:killed Cloneflags:0 Unshareflags:0 UidMappings:[] GidMappings:[] GidMappingsEnableSetgroups:false AmbientCaps:[]} I0829 05:18:31.911207 35464 x:0] Sandbox started, PID: 35564 I0829 05:18:31.978336 35564 x:0] *************************** I0829 05:18:31.978463 35564 x:0] Args: [runsc-sandbox --root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true --panic-signal=15 boot --bundle=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/bundle --controller-fd=3 --mounts-fd=4 --spec-fd=5 --start-sync-fd=6 --io-fds=7 --stdio-fds=8 --stdio-fds=9 --stdio-fds=10 --apply-caps=true --setup-root ci-gvisor-kvm-direct-overlay-host-race-test-2] I0829 05:18:31.978667 35564 x:0] Version {VERSION} I0829 05:18:31.978689 35564 x:0] PID: 35564 I0829 05:18:31.978739 35564 x:0] UID: 0, GID: 0 I0829 05:18:31.978780 35564 x:0] Configuration: I0829 05:18:31.978797 35564 x:0] RootDir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root I0829 05:18:31.979073 35564 x:0] Platform: ptrace I0829 05:18:31.979107 35564 x:0] FileAccess: exclusive, overlay: true I0829 05:18:31.979169 35564 x:0] Network: host, logging: false I0829 05:18:31.979206 35564 x:0] Strace: false, max size: 1024, syscalls: [] I0829 05:18:31.979241 35564 x:0] *************************** I0829 05:18:31.979364 35564 x:0] Setting up sandbox chroot in "/tmp" I0829 05:18:31.979491 35564 x:0] Mounting "/proc" at "/tmp/proc" D0829 05:18:32.057301 35564 x:0] Spec: &{Version: Process:0xc00028b450 Root:0xc0002aae60 Hostname: Mounts:[] Hooks: Annotations:map[] Linux: Solaris: Windows:} D0829 05:18:32.057426 35564 x:0] Spec.Hooks: D0829 05:18:32.057471 35564 x:0] Spec.Linux: D0829 05:18:32.057493 35564 x:0] Spec.Process: &{Terminal:false ConsoleSize: User:{UID:0 GID:0 AdditionalGids:[] Username:} Args:[/init] Env:[SYZ_GVISOR_PROXY=1] Cwd:/tmp Capabilities:0xc000148380 Rlimits:[] NoNewPrivileges:false ApparmorProfile: OOMScoreAdj: SelinuxLabel:} D0829 05:18:32.057631 35564 x:0] Spec.Root: &{Path:/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-2/image Readonly:true} D0829 05:18:32.057669 35564 x:0] Spec.Mounts: [] I0829 05:18:32.058176 35564 x:0] Capabilities applied: { effective="full" permitted="full" inheritable="full" bounding="full" } I0829 05:18:32.058269 35564 x:0] Execve "/proc/self/exe" again, bye! W0829 05:18:32.059858 35564 x:0] FATAL ERROR: error executing /proc/self/exe: no such file or directory error executing /proc/self/exe: no such file or directory