diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2020-05-14 10:18:03 +0200 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2020-05-18 11:34:42 +0200 |
| commit | 1eaedf0feaf2b71d2a29b8bc8c4697e6997edbf8 (patch) | |
| tree | 65c8b8519b6b4258437fec64e8d6277f66928917 /pkg/osutil/osutil_linux.go | |
| parent | 37bccd4ed9e71025cd84e857f9ffca4ec8451c6b (diff) | |
pkg/osutil: don't sandbox on CI
CI does not have syzkaller user, but may run under root.
Update #1699
Diffstat (limited to 'pkg/osutil/osutil_linux.go')
| -rw-r--r-- | pkg/osutil/osutil_linux.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pkg/osutil/osutil_linux.go b/pkg/osutil/osutil_linux.go index 79df69999..30544d2e9 100644 --- a/pkg/osutil/osutil_linux.go +++ b/pkg/osutil/osutil_linux.go @@ -106,7 +106,7 @@ var ( func initSandbox() (bool, uint32, uint32, error) { sandboxOnce.Do(func() { - if syscall.Getuid() != 0 || os.Getenv("SYZ_DISABLE_SANDBOXING") == "yes" { + if syscall.Getuid() != 0 || os.Getenv("CI") != "" || os.Getenv("SYZ_DISABLE_SANDBOXING") == "yes" { sandboxEnabled = false return } |
