I0829 10:01:46.356920 29444 x:0] *************************** I0829 10:01:46.357028 29444 x:0] Args: [/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/image -root /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -alsologtostderr -platform=ptrace -file-access=exclusive -overlay -network=host run -bundle /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/bundle ci-gvisor-kvm-direct-overlay-host-race-test-0] I0829 10:01:46.357138 29444 x:0] Version {VERSION} I0829 10:01:46.357168 29444 x:0] PID: 29444 I0829 10:01:46.357205 29444 x:0] UID: 0, GID: 0 I0829 10:01:46.357253 29444 x:0] Configuration: I0829 10:01:46.357279 29444 x:0] RootDir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root I0829 10:01:46.357331 29444 x:0] Platform: ptrace I0829 10:01:46.357359 29444 x:0] FileAccess: exclusive, overlay: true I0829 10:01:46.357405 29444 x:0] Network: host, logging: false I0829 10:01:46.357453 29444 x:0] Strace: false, max size: 1024, syscalls: [] I0829 10:01:46.357502 29444 x:0] *************************** D0829 10:01:46.362176 29444 x:0] Spec: &{Version: Process:0xc000264d00 Root:0xc000272e60 Hostname: Mounts:[] Hooks: Annotations:map[] Linux: Solaris: Windows:} D0829 10:01:46.362280 29444 x:0] Spec.Hooks: D0829 10:01:46.362305 29444 x:0] Spec.Linux: D0829 10:01:46.362326 29444 x:0] Spec.Process: &{Terminal:false ConsoleSize: User:{UID:0 GID:0 AdditionalGids:[] Username:} Args:[/init] Env:[SYZ_GVISOR_PROXY=1] Cwd:/tmp Capabilities:0xc000136380 Rlimits:[] NoNewPrivileges:false ApparmorProfile: OOMScoreAdj: SelinuxLabel:} D0829 10:01:46.362460 29444 x:0] Spec.Root: &{Path:/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/image Readonly:true} D0829 10:01:46.362516 29444 x:0] Spec.Mounts: [] D0829 10:01:46.362536 29444 x:0] Run container "ci-gvisor-kvm-direct-overlay-host-race-test-0" in root dir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root D0829 10:01:46.362616 29444 x:0] Create container "ci-gvisor-kvm-direct-overlay-host-race-test-0" in root dir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root D0829 10:01:46.363031 29444 x:0] Creating new sandbox for container "ci-gvisor-kvm-direct-overlay-host-race-test-0" D0829 10:01:46.363194 29444 x:0] Starting gofer: /proc/self/exe [--root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true gofer --bundle /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/bundle --panic-on-write=true --spec-fd=3 --mounts-fd=4 --io-fds=5] I0829 10:01:46.367562 29444 x:0] Gofer started, PID: 29463 I0829 10:01:46.367905 29444 x:0] Creating sandbox process with addr: runsc-sandbox.ci-gvisor-kvm-direct-overlay-host-race-test-0 I0829 10:01:46.368013 29444 x:0] Sandbox will be started in new mount, IPC and UTS namespaces I0829 10:01:46.368042 29444 x:0] Sandbox will be started in the current PID namespace I0829 10:01:46.368089 29444 x:0] Sandbox will be started in the host network namespace I0829 10:01:46.368119 29444 x:0] Sandbox will be started in the current user namespace I0829 10:01:46.368382 29444 x:0] Sandbox will be started in minimal chroot D0829 10:01:46.368420 29444 x:0] Donating FD 3: "control_server_socket" D0829 10:01:46.368480 29444 x:0] Donating FD 4: "|0" D0829 10:01:46.368511 29444 x:0] Donating FD 5: "/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/bundle/config.json" D0829 10:01:46.368601 29444 x:0] Donating FD 6: "|1" D0829 10:01:46.368624 29444 x:0] Donating FD 7: "sandbox IO FD" D0829 10:01:46.368661 29444 x:0] Donating FD 8: "/dev/stdin" D0829 10:01:46.368765 29444 x:0] Donating FD 9: "/dev/stdout" D0829 10:01:46.368792 29444 x:0] Donating FD 10: "/dev/stderr" D0829 10:01:46.368827 29444 x:0] Starting sandbox: /proc/self/exe [runsc-sandbox --root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true --panic-signal=15 boot --bundle=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/bundle --controller-fd=3 --mounts-fd=4 --spec-fd=5 --start-sync-fd=6 --io-fds=7 --stdio-fds=8 --stdio-fds=9 --stdio-fds=10 --apply-caps=true --setup-root ci-gvisor-kvm-direct-overlay-host-race-test-0] D0829 10:01:46.368957 29444 x:0] SysProcAttr: &{Chroot: Credential: Ptrace:false Setsid:true Setpgid:false Setctty:false Noctty:false Ctty:0 Foreground:false Pgid:0 Pdeathsig:killed Cloneflags:0 Unshareflags:0 UidMappings:[] GidMappings:[] GidMappingsEnableSetgroups:false AmbientCaps:[]} I0829 10:01:46.369683 29444 x:0] Sandbox started, PID: 29465 I0829 10:01:46.401064 29465 x:0] *************************** I0829 10:01:46.401202 29465 x:0] Args: [runsc-sandbox --root=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root --debug=true --log= --log-format=text --debug-log= --debug-log-format=text --file-access=exclusive --overlay=true --network=host --log-packets=false --platform=ptrace --strace=false --strace-syscalls= --strace-log-size=1024 --watchdog-action=Panic --panic-signal=-1 --profile=false --net-raw=false --num-network-channels=1 --rootless=false --alsologtostderr=true --panic-signal=15 boot --bundle=/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/bundle --controller-fd=3 --mounts-fd=4 --spec-fd=5 --start-sync-fd=6 --io-fds=7 --stdio-fds=8 --stdio-fds=9 --stdio-fds=10 --apply-caps=true --setup-root ci-gvisor-kvm-direct-overlay-host-race-test-0] I0829 10:01:46.401417 29465 x:0] Version {VERSION} I0829 10:01:46.401458 29465 x:0] PID: 29465 I0829 10:01:46.401492 29465 x:0] UID: 0, GID: 0 I0829 10:01:46.401537 29465 x:0] Configuration: I0829 10:01:46.401559 29465 x:0] RootDir: /syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/gvisor_root I0829 10:01:46.401591 29465 x:0] Platform: ptrace I0829 10:01:46.401639 29465 x:0] FileAccess: exclusive, overlay: true I0829 10:01:46.401736 29465 x:0] Network: host, logging: false I0829 10:01:46.401773 29465 x:0] Strace: false, max size: 1024, syscalls: [] I0829 10:01:46.401814 29465 x:0] *************************** I0829 10:01:46.402072 29465 x:0] Setting up sandbox chroot in "/tmp" I0829 10:01:46.408214 29465 x:0] Mounting "/proc" at "/tmp/proc" D0829 10:01:46.472993 29465 x:0] Spec: &{Version: Process:0xc00028b520 Root:0xc0002a8e60 Hostname: Mounts:[] Hooks: Annotations:map[] Linux: Solaris: Windows:} D0829 10:01:46.473170 29465 x:0] Spec.Hooks: D0829 10:01:46.473217 29465 x:0] Spec.Linux: D0829 10:01:46.473253 29465 x:0] Spec.Process: &{Terminal:false ConsoleSize: User:{UID:0 GID:0 AdditionalGids:[] Username:} Args:[/init] Env:[SYZ_GVISOR_PROXY=1] Cwd:/tmp Capabilities:0xc000148380 Rlimits:[] NoNewPrivileges:false ApparmorProfile: OOMScoreAdj: SelinuxLabel:} D0829 10:01:46.473389 29465 x:0] Spec.Root: &{Path:/syzkaller/managers/kvm-direct-overlay-host-race/latest.tmp/workdir/instance-1/image Readonly:true} D0829 10:01:46.473461 29465 x:0] Spec.Mounts: [] I0829 10:01:46.474013 29465 x:0] Capabilities applied: { effective="full" permitted="full" inheritable="full" bounding="full" } I0829 10:01:46.474105 29465 x:0] Execve "/proc/self/exe" again, bye! W0829 10:01:46.474448 29465 x:0] FATAL ERROR: error executing /proc/self/exe: no such file or directory error executing /proc/self/exe: no such file or directory