diff options
| author | Florent Revest <revest@chromium.org> | 2025-01-13 15:23:23 +0100 |
|---|---|---|
| committer | Aleksandr Nogikh <nogikh@google.com> | 2025-01-13 15:15:35 +0000 |
| commit | b1f1cd885392add389778baffd5cdafbeccb7934 (patch) | |
| tree | 6fc11f59a78df404786e70c36c1179b37e4da35e /executor | |
| parent | 3f6ed5888bda84980406819a976c6c8155e89c58 (diff) | |
fsck: fix permissions of the temp fs image when a sandbox is used
My dev environment skips the osutil_linux sandbox because it doesn't
have a "syzkaller" user and group. The CI environment also skips the
sandbox because it sets the "CI" environment variable.
Therefore, nothing caught that, when run in the syzbot docker container,
(which has a "syzkaller" user) the sandbox actually starts to be used
and breaks fsck commands.
Syz-manager, which is run as root, writes the image to /tmp/1234.img
with permissions 0600 and then tries to run fsck under the "syzkaller"
user which doesn't have read permissions on the file, so fsck fails:
fsck.ext4 -n exited with status code 8
e2fsck 1.47.0 (5-Feb-2023)
fsck.ext4: Permission denied while trying to open /tmp/1234.img
You must have r/o access to the filesystem or be root
Changing the owner of the file to the "syzkaller" user before attempting
to run fsck under that user fixes the problem.
Diffstat (limited to 'executor')
0 files changed, 0 insertions, 0 deletions
