aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--pkg/mgrconfig/config.go17
1 files changed, 11 insertions, 6 deletions
diff --git a/pkg/mgrconfig/config.go b/pkg/mgrconfig/config.go
index 20a0b7b57..2c3d19475 100644
--- a/pkg/mgrconfig/config.go
+++ b/pkg/mgrconfig/config.go
@@ -112,12 +112,17 @@ type Config struct {
MaxCrashLogs int `json:"max_crash_logs"`
// Type of sandbox to use during fuzzing:
- // "none": don't do anything special beyond resource sandboxing, default
- // "setuid": impersonate into user nobody (65534). Supported only for some OSes.
- // "namespace": create a new namespace for fuzzer using CLONE_NEWNS/CLONE_NEWNET/CLONE_NEWPID/etc,
- // requires building kernel with CONFIG_NAMESPACES, CONFIG_UTS_NS, CONFIG_USER_NS,
- // CONFIG_PID_NS and CONFIG_NET_NS. Supported only for some OSes.
- // "android": (Android) Emulate permissions of an untrusted app.
+ // "none": test under root;
+ // don't do anything special beyond resource sandboxing,
+ // gives the most coverage, default
+ // "namespace": create a new user namespace for testing using CLONE_NEWUSER (supported only on Linux),
+ // the test process has CAP_ADMIN inside of the user namespace, but not in the init namespace,
+ // but the test process still has access to all /dev/ nodes owned by root,
+ // this is a compromise between coverage and bug impact,
+ // requires building kernel with CONFIG_USER_NS
+ // "setuid": impersonate into user nobody (65534) (supported on Linux, FreeBSD, NetBSD, OpenBSD)
+ // this is the most restrictive sandbox
+ // "android": emulate permissions of an untrusted Android app (supported only on Linux)
Sandbox string `json:"sandbox"`
// Use KCOV coverage (default: true).