Sandboxed API Team 3323ddc129 Permit sandboxee's bpf() to fail
The default policy causes immediate termination of a sandboxee that
calls `bpf`(2).

This does not allow for try-call use of `bpf()` to test for optional
features.

To support such try-call use cases, sandboxes would like to say:

```
  sandbox2::PolicyBuilder builder;
  builder.BlockSyscallWithErrno(__NR_bpf, EPERM);
```

but this doesn't work because the default policy unconditionally treats
`bpf()` as a sandbox violation.

Remove the bpf violation check from the policy if `bpf()` is explicitly
blocked with an errno.

PiperOrigin-RevId: 345239389
Change-Id: I7fcfd3a938c610c8679edf8e1fa0238b32cc9db4
2020-12-02 08:38:32 -08:00
..
2020-11-19 08:37:41 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-09-11 06:34:27 -07:00
2020-11-05 08:48:03 -08:00
2020-10-05 05:10:16 -07:00
2020-01-31 05:39:25 -08:00
2020-09-11 06:34:27 -07:00
2020-12-02 08:38:32 -08:00
2020-12-02 08:38:32 -08:00
2019-10-07 02:36:35 -07:00
2020-09-11 06:34:27 -07:00
2020-09-11 06:34:27 -07:00
2020-07-20 00:24:40 -07:00
2020-09-03 07:40:33 -07:00
2020-09-03 07:40:33 -07:00
2020-07-20 00:24:40 -07:00
2020-09-11 06:34:27 -07:00
2020-05-29 05:40:52 -07:00
2020-10-15 13:25:30 -07:00
2020-09-03 07:40:33 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.