Wiktor Garbacz 26da6e6b0a Safer and more efficient custom syscall policies
Generate syscall jump table without using bpf_helper.
Check that any jump in the user provided policy is within the provided policy.

PiperOrigin-RevId: 409362089
Change-Id: I31493e52cf868e4b184ff79fcb26beeb75f49773
2021-11-12 02:44:41 -08:00
..
2021-10-11 07:50:27 -07:00
2021-08-12 08:03:52 -07:00
2021-09-20 09:02:14 -07:00
2021-02-19 04:43:14 -08:00
2020-10-01 06:45:38 -07:00
2021-09-29 22:12:26 -07:00
2020-10-01 06:45:38 -07:00
2021-05-10 07:04:04 -07:00
2020-01-31 05:39:25 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-07-29 05:52:19 -07:00
2021-05-20 08:17:10 -07:00
2021-09-01 01:28:19 -07:00
2021-05-17 04:07:08 -07:00
2021-05-10 07:04:04 -07:00
2019-10-07 02:36:35 -07:00
2021-03-18 05:56:40 -07:00
2021-06-04 01:01:34 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.