From 1eaedf0feaf2b71d2a29b8bc8c4697e6997edbf8 Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Thu, 14 May 2020 10:18:03 +0200 Subject: pkg/osutil: don't sandbox on CI CI does not have syzkaller user, but may run under root. Update #1699 --- pkg/osutil/osutil_linux.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'pkg/osutil') diff --git a/pkg/osutil/osutil_linux.go b/pkg/osutil/osutil_linux.go index 79df69999..30544d2e9 100644 --- a/pkg/osutil/osutil_linux.go +++ b/pkg/osutil/osutil_linux.go @@ -106,7 +106,7 @@ var ( func initSandbox() (bool, uint32, uint32, error) { sandboxOnce.Do(func() { - if syscall.Getuid() != 0 || os.Getenv("SYZ_DISABLE_SANDBOXING") == "yes" { + if syscall.Getuid() != 0 || os.Getenv("CI") != "" || os.Getenv("SYZ_DISABLE_SANDBOXING") == "yes" { sandboxEnabled = false return } -- cgit mrf-deployment