sandboxed-api/sandboxed_api/sandbox2
Sandboxed API Team 79049b09c0 Add helper function for MADV_WIPEONFORK.
BoringSSL (which is the crypto library used by most Google products) is starting to use madvise(_, _, MADV_WIPEONFORK) to protect random-number state from being duplicated by fork(). This causes extra madvise calls that sandboxes need to permit in order to continue functioning.

PiperOrigin-RevId: 309173849
Change-Id: I007dacc1ff1fd0ccc138caaa08735cfe5bc78234
2020-04-30 00:08:55 -07:00
..
examples Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
network_proxy Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
testcases Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
unwind Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
util Update dependencies to latest versions 2020-04-29 06:45:44 -07:00
bpfdisassembler.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
bpfdisassembler.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
buffer_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
buffer.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
buffer.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
BUILD.bazel Split sanitizer.h into a separate library 2020-04-07 13:26:51 -07:00
client.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
client.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
CMakeLists.txt Split sanitizer.h into a separate library 2020-04-07 13:26:51 -07:00
comms_test.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
comms_test.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
comms.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
comms.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
executor.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
executor.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkingclient.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkingclient.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver_bin.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
forkserver.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver.proto Internal change 2020-01-31 05:39:25 -08:00
global_forkclient.cc Replace if (!cond) { LOG(FATAL, msg) } with CHECK(cond, msg) 2020-01-28 05:59:33 -08:00
global_forkclient.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
ipc_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
ipc.cc Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
ipc.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
limits_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
limits.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logsink.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logsink.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
monitor.cc Qualify uses of std::string 2020-02-27 00:03:55 -08:00
monitor.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
mounts_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
mounts.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
mounts.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
mounttree.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
namespace_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
namespace.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
namespace.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
notify_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
notify.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
policy_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
policy.cc Qualify uses of std::string 2020-02-27 00:03:55 -08:00
policy.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
policybuilder_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
policybuilder.cc Add helper function for MADV_WIPEONFORK. 2020-04-30 00:08:55 -07:00
policybuilder.h Add helper function for MADV_WIPEONFORK. 2020-04-30 00:08:55 -07:00
README.md Corrects typo in link 2019-10-07 02:36:35 -07:00
regs.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
regs.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
result.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
result.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
sandbox2_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sandbox2.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
sandbox2.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
stack_trace_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
stack_trace.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
stack_trace.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall_defs.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
syscall_defs.h Refactor syscall definitions to rely less on macros 2020-01-07 05:27:21 -08:00
syscall_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
testing.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
testing.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
util_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
util.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
util.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
violation.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.