Wiktor Garbacz 0ec4f07f96 Fix rare failure while starting the global forkserver
This bug only manifests if a lot of fds are open when global forkserver is started.
If the allocated exec_fd number was equal Comms::kSandbox2ClientCommsFD then it would be replaced by the comms fd and result in EACCESS at execveat.

PiperOrigin-RevId: 380805414
Change-Id: I31427fa929abfc60890477b55790cc14c749f7f5
2021-06-22 07:48:58 -07:00
..
2021-02-19 04:43:14 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2021-05-18 05:48:54 -07:00
2021-05-10 07:04:04 -07:00
2021-05-17 04:07:08 -07:00
2021-02-02 06:55:30 -08:00
2020-10-05 05:10:16 -07:00
2021-05-17 04:07:08 -07:00
2020-01-31 05:39:25 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-01-27 08:05:25 -08:00
2021-05-20 08:17:10 -07:00
2021-05-17 04:07:08 -07:00
2021-05-10 07:04:04 -07:00
2021-01-22 06:01:34 -08:00
2021-05-20 08:17:10 -07:00
2021-05-20 08:17:10 -07:00
2021-05-20 08:17:10 -07:00
2019-10-07 02:36:35 -07:00
2021-01-22 06:01:34 -08:00
2020-09-03 07:40:33 -07:00
2020-09-03 07:40:33 -07:00
2021-01-22 06:01:34 -08:00
2021-03-18 05:56:40 -07:00
2021-06-04 01:01:34 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.