aboutsummaryrefslogtreecommitdiffstats
path: root/executor
diff options
context:
space:
mode:
authorFlorent Revest <revest@chromium.org>2025-01-13 15:23:23 +0100
committerAleksandr Nogikh <nogikh@google.com>2025-01-13 15:15:35 +0000
commitb1f1cd885392add389778baffd5cdafbeccb7934 (patch)
tree6fc11f59a78df404786e70c36c1179b37e4da35e /executor
parent3f6ed5888bda84980406819a976c6c8155e89c58 (diff)
fsck: fix permissions of the temp fs image when a sandbox is used
My dev environment skips the osutil_linux sandbox because it doesn't have a "syzkaller" user and group. The CI environment also skips the sandbox because it sets the "CI" environment variable. Therefore, nothing caught that, when run in the syzbot docker container, (which has a "syzkaller" user) the sandbox actually starts to be used and breaks fsck commands. Syz-manager, which is run as root, writes the image to /tmp/1234.img with permissions 0600 and then tries to run fsck under the "syzkaller" user which doesn't have read permissions on the file, so fsck fails: fsck.ext4 -n exited with status code 8 e2fsck 1.47.0 (5-Feb-2023) fsck.ext4: Permission denied while trying to open /tmp/1234.img You must have r/o access to the filesystem or be root Changing the owner of the file to the "syzkaller" user before attempting to run fsck under that user fixes the problem.
Diffstat (limited to 'executor')
0 files changed, 0 insertions, 0 deletions