sandboxed-api/sandboxed_api/sandbox2
Sandboxed API Team f29a5a81ed Print final FS mounts in sandboxee's chroot
After all requested filesystem mounts are fully mounted under a sandboxee's virtual chroot, print a list of the outside paths and a list of the inside chroot paths that the outside paths are mapped to. This provides a valuable insight while debugging sandboxed binaries.

PiperOrigin-RevId: 247130923
Change-Id: I42b4b3db68d826587c0fe8127aabbead38bc6f20
2019-05-07 18:30:13 -07:00
..
docs Internal change 2019-04-23 10:42:14 -07:00
examples Use a longer string in the CRC4 buffer overflow example. 2019-03-26 07:28:15 -07:00
testcases CMake support for Sandbox2 2019-05-06 14:03:29 +02:00
unwind CMake support for Sandbox2 2019-05-06 14:03:29 +02:00
util CMake support for Sandbox2 2019-05-06 14:03:29 +02:00
bpfdisassembler.cc Add support for new SECCOMP_RET_* in disassembler 2019-04-09 14:38:05 +02:00
bpfdisassembler.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
buffer_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
buffer.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
buffer.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
BUILD.bazel Print final FS mounts in sandboxee's chroot 2019-05-07 18:30:13 -07:00
client.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
client.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
CMakeLists.txt CMake support for Sandbox2 2019-05-06 14:03:29 +02:00
comms_test.cc Internal change 2019-04-23 10:42:14 -07:00
comms_test.proto Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
comms.cc Make StatusMatcher more flexible 2019-04-23 10:30:45 -07:00
comms.h Make StatusMatcher more flexible 2019-04-23 10:30:45 -07:00
executor.cc Improve internal<->external code transforms 2019-03-19 05:51:53 -07:00
executor.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
forkingclient.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
forkingclient.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
forkserver_bin.cc Move forkserver into a dedicated binary 2019-04-09 14:37:41 +02:00
forkserver_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
forkserver.cc Move forkserver into a dedicated binary 2019-04-09 14:37:41 +02:00
forkserver.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
forkserver.proto Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
global_forkclient.cc Move forkserver into a dedicated binary 2019-04-09 14:37:41 +02:00
global_forkclient.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
ipc_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
ipc.cc Formatting fixes. 2019-03-19 03:41:32 -07:00
ipc.h Formatting fixes. 2019-03-19 03:41:32 -07:00
limits_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
limits.h Formatting fixes. 2019-03-19 03:41:32 -07:00
logserver.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
logserver.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
logserver.proto Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
logsink.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
logsink.h Internal change 2019-04-26 06:18:59 -07:00
monitor.cc Print final FS mounts in sandboxee's chroot 2019-05-07 18:30:13 -07:00
monitor.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
mounts_test.cc Print final FS mounts in sandboxee's chroot 2019-05-07 18:30:13 -07:00
mounts.cc Print final FS mounts in sandboxee's chroot 2019-05-07 18:30:13 -07:00
mounts.h Print final FS mounts in sandboxee's chroot 2019-05-07 18:30:13 -07:00
mounttree.proto Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
namespace_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
namespace.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
namespace.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
network_proxy_client.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
network_proxy_client.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
network_proxy_server.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
network_proxy_server.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
notify_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
notify.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
policy_test.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
policy.cc Improve internal<->external code transforms 2019-03-19 05:51:53 -07:00
policy.h Rename deathrattle_fatalmsg proto 2019-03-20 05:19:55 -07:00
policybuilder_test.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
policybuilder.cc Allow TCMalloc to access the rseq syscall. 2019-04-13 13:45:35 -07:00
policybuilder.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
README.md Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
regs.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
regs.h Rename deathrattle_fatalmsg proto 2019-03-20 05:19:55 -07:00
result.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
result.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
sandbox2_test.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
sandbox2.cc Formatting fixes. 2019-03-19 03:41:32 -07:00
sandbox2.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
sanitizer_test.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
sanitizer.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
sanitizer.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
stack-trace_test.cc Try to demangle c++ symbols when logging the stacktrace 2019-04-15 07:37:23 -07:00
stack-trace.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
stack-trace.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
syscall_defs.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
syscall_defs.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
syscall_test.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
syscall.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
syscall.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
testing.cc Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
testing.h Sandboxed API OSS release. 2019-03-18 19:00:48 +01:00
util_test.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
util.cc Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
util.h Formatting fixes and include file hygiene. 2019-03-26 07:54:21 -07:00
violation.proto Disable "mini" debug format support in libunwind to avoid additional library dependency 2019-03-20 08:03:08 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Who is it for?

Sandbox2 is aimed to sandbox C/C++ code or whole binaries in production.

See the sandboxing options overview page to make sure this is the type of sandboxing you are looking for.

How does it work?

Read our How it works page to learn everything about this technology.