Christian Blichmann 1f1de9e229 Fix logging/display of syscall tables
Initializing `absl::Span`s like by assigning them from a temporary
array leaves them pointing to invalid data. Due to the way the linker
initializes these constant tables, _most_ of them will still be valid
_most_ of the time, leading to crashes when running sandboxees with the
`--sandbox2_danger_danger_permit_all_and_log` option.

PiperOrigin-RevId: 321112099
Change-Id: I891118da08cbb6000b3e2e275618bc4edaa1d020
2020-07-14 00:47:54 -07:00
..
2020-07-10 09:01:49 -07:00
2020-07-01 08:23:46 -07:00
2020-06-18 03:19:01 -07:00
2020-02-27 09:24:12 -08:00
2020-07-01 08:23:46 -07:00
2020-07-01 08:23:46 -07:00
2020-07-10 09:01:49 -07:00
2020-01-31 05:39:25 -08:00
2020-02-27 00:03:55 -08:00
2020-07-01 08:23:46 -07:00
2020-07-01 08:23:46 -07:00
2019-10-07 02:36:35 -07:00
2020-02-27 09:24:12 -08:00
2020-02-27 09:24:12 -08:00
2020-07-01 08:23:46 -07:00
2020-05-29 05:40:52 -07:00
2020-07-10 09:01:49 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.