diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2022-07-18 09:41:15 +0200 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2022-07-18 14:23:28 +0200 |
| commit | ff988920cbabff061e582d566b7f9b99bb9e7d1f (patch) | |
| tree | 03697cc251c3cc928f7a747a60bd2a782e9d0fee /pkg | |
| parent | 95cb00d1ffccfb9043ac5d91ff8103bbb9befae8 (diff) | |
pkg/mgrconfig: extend sandbox docs
Slightly clarify what exactly each sandbox means.
Diffstat (limited to 'pkg')
| -rw-r--r-- | pkg/mgrconfig/config.go | 17 |
1 files changed, 11 insertions, 6 deletions
diff --git a/pkg/mgrconfig/config.go b/pkg/mgrconfig/config.go index 20a0b7b57..2c3d19475 100644 --- a/pkg/mgrconfig/config.go +++ b/pkg/mgrconfig/config.go @@ -112,12 +112,17 @@ type Config struct { MaxCrashLogs int `json:"max_crash_logs"` // Type of sandbox to use during fuzzing: - // "none": don't do anything special beyond resource sandboxing, default - // "setuid": impersonate into user nobody (65534). Supported only for some OSes. - // "namespace": create a new namespace for fuzzer using CLONE_NEWNS/CLONE_NEWNET/CLONE_NEWPID/etc, - // requires building kernel with CONFIG_NAMESPACES, CONFIG_UTS_NS, CONFIG_USER_NS, - // CONFIG_PID_NS and CONFIG_NET_NS. Supported only for some OSes. - // "android": (Android) Emulate permissions of an untrusted app. + // "none": test under root; + // don't do anything special beyond resource sandboxing, + // gives the most coverage, default + // "namespace": create a new user namespace for testing using CLONE_NEWUSER (supported only on Linux), + // the test process has CAP_ADMIN inside of the user namespace, but not in the init namespace, + // but the test process still has access to all /dev/ nodes owned by root, + // this is a compromise between coverage and bug impact, + // requires building kernel with CONFIG_USER_NS + // "setuid": impersonate into user nobody (65534) (supported on Linux, FreeBSD, NetBSD, OpenBSD) + // this is the most restrictive sandbox + // "android": emulate permissions of an untrusted Android app (supported only on Linux) Sandbox string `json:"sandbox"` // Use KCOV coverage (default: true). |
