aboutsummaryrefslogtreecommitdiffstats
path: root/pkg/mgrconfig
diff options
context:
space:
mode:
authorDmitry Vyukov <dvyukov@google.com>2022-07-18 09:41:15 +0200
committerDmitry Vyukov <dvyukov@google.com>2022-07-18 14:23:28 +0200
commitff988920cbabff061e582d566b7f9b99bb9e7d1f (patch)
tree03697cc251c3cc928f7a747a60bd2a782e9d0fee /pkg/mgrconfig
parent95cb00d1ffccfb9043ac5d91ff8103bbb9befae8 (diff)
pkg/mgrconfig: extend sandbox docs
Slightly clarify what exactly each sandbox means.
Diffstat (limited to 'pkg/mgrconfig')
-rw-r--r--pkg/mgrconfig/config.go17
1 files changed, 11 insertions, 6 deletions
diff --git a/pkg/mgrconfig/config.go b/pkg/mgrconfig/config.go
index 20a0b7b57..2c3d19475 100644
--- a/pkg/mgrconfig/config.go
+++ b/pkg/mgrconfig/config.go
@@ -112,12 +112,17 @@ type Config struct {
MaxCrashLogs int `json:"max_crash_logs"`
// Type of sandbox to use during fuzzing:
- // "none": don't do anything special beyond resource sandboxing, default
- // "setuid": impersonate into user nobody (65534). Supported only for some OSes.
- // "namespace": create a new namespace for fuzzer using CLONE_NEWNS/CLONE_NEWNET/CLONE_NEWPID/etc,
- // requires building kernel with CONFIG_NAMESPACES, CONFIG_UTS_NS, CONFIG_USER_NS,
- // CONFIG_PID_NS and CONFIG_NET_NS. Supported only for some OSes.
- // "android": (Android) Emulate permissions of an untrusted app.
+ // "none": test under root;
+ // don't do anything special beyond resource sandboxing,
+ // gives the most coverage, default
+ // "namespace": create a new user namespace for testing using CLONE_NEWUSER (supported only on Linux),
+ // the test process has CAP_ADMIN inside of the user namespace, but not in the init namespace,
+ // but the test process still has access to all /dev/ nodes owned by root,
+ // this is a compromise between coverage and bug impact,
+ // requires building kernel with CONFIG_USER_NS
+ // "setuid": impersonate into user nobody (65534) (supported on Linux, FreeBSD, NetBSD, OpenBSD)
+ // this is the most restrictive sandbox
+ // "android": emulate permissions of an untrusted Android app (supported only on Linux)
Sandbox string `json:"sandbox"`
// Use KCOV coverage (default: true).