sandboxed-api/sandboxed_api/sandbox2
Wiktor Garbacz a5d12903dd Extract SandboxeeProcess and move it down the call chain
PiperOrigin-RevId: 507718207
Change-Id: Ia1f6fc2f09abbde5311f8dc0f596aa605989140d
2023-02-07 02:22:45 -08:00
..
examples Update clients of PolicyBuilder to support architectures other than x86_64. 2023-01-04 01:44:20 -08:00
network_proxy Use SyscallTrap in NetworkProxy 2022-11-30 05:47:44 -08:00
testcases Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
unwind stack_trace: pass fd to sandboxee's memory instead of using process_vm_readv 2023-01-19 05:44:50 -08:00
util Introduce SyscallTrap helper class 2022-11-30 05:21:12 -08:00
bpfdisassembler.cc Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
bpfdisassembler.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
buffer_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
buffer.cc Remove Tag constructor, add standard comment for absl::WrapUnique(new T) 2022-10-25 06:20:51 -07:00
buffer.h Remove Tag constructor, add standard comment for absl::WrapUnique(new T) 2022-10-25 06:20:51 -07:00
BUILD.bazel Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
client.cc #Cleanup: Consistently use std::make_unique 2022-10-12 05:23:42 -07:00
client.h Sandbox2: Graciously handle mapping over Comms/Exec fds 2022-10-10 09:39:01 -07:00
CMakeLists.txt Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
comms_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
comms_test.proto Migration of remaining protobufs from proto2 to proto3 2022-03-16 00:43:46 -07:00
comms.cc contrib: Replace uses of CHECK_NOTNULL 2022-10-25 05:50:59 -07:00
comms.h Sandbox2: Graciously handle mapping over Comms/Exec fds 2022-10-10 09:39:01 -07:00
executor.cc Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
executor.h Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
fork_client.cc Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
fork_client.h Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
forkingclient.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
forkingclient.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
forkserver_bin.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
forkserver_test.cc Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
forkserver.cc Remove AllowUnsafeKeepCapabilities() 2023-02-02 04:47:02 -08:00
forkserver.h stack_trace: pass fd to sandboxee's memory instead of using process_vm_readv 2023-01-19 05:44:50 -08:00
forkserver.proto Migrate forkserver.proto to proto3 syntax 2022-03-14 07:28:23 -07:00
global_forkclient_lib_ctor.cc Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
global_forkclient.cc Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
global_forkclient.h Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
ipc_test.cc #Cleanup: Consistently use std::make_unique 2022-10-12 05:23:42 -07:00
ipc.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
ipc.h Split PtraceMonitor out of Monitor 2023-01-23 01:42:28 -08:00
limits_test.cc #Cleanup: Consistently use std::make_unique 2022-10-12 05:23:42 -07:00
limits.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
logserver.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
logserver.h Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
logserver.proto Migration of remaining protobufs from proto2 to proto3 2022-03-16 00:43:46 -07:00
logsink.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
logsink.h Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
monitor_base.cc Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
monitor_base.h Extract SandboxeeProcess and move it down the call chain 2023-02-07 02:22:45 -08:00
monitor_ptrace.cc Split PtraceMonitor into separate file 2023-01-30 05:09:20 -08:00
monitor_ptrace.h Split PtraceMonitor into separate file 2023-01-30 05:09:20 -08:00
mount_tree.proto Migrate to proto3, change is_ro to is_rw (default value is false), and rename mounttree.proto 2022-03-14 05:15:15 -07:00
mounts_test.cc stack_trace: pass fd to sandboxee's memory instead of using process_vm_readv 2023-01-19 05:44:50 -08:00
mounts.cc Protobuf doesn't directly support heterogeneous lookup with absl::string_view 2023-01-19 07:32:03 -08:00
mounts.h stack_trace: pass fd to sandboxee's memory instead of using process_vm_readv 2023-01-19 05:44:50 -08:00
namespace_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
namespace.cc Remove AllowUnsafeKeepCapabilities() 2023-02-02 04:47:02 -08:00
namespace.h Remove AllowUnsafeKeepCapabilities() 2023-02-02 04:47:02 -08:00
notify_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
notify.h Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
policy_test.cc Use new helpers in policy_test 2022-12-21 06:17:07 -08:00
policy.cc Update IfThenChange after monitor split 2023-02-02 05:17:03 -08:00
policy.h Remove AllowUnsafeKeepCapabilities() 2023-02-02 04:47:02 -08:00
policybuilder_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
policybuilder.cc Allow MADV_HUGEPAGE used by tcmalloc 2023-01-13 04:41:22 -08:00
policybuilder.h Update PolicyBuilder to include wrappers for more syscall families that differ between platforms. 2022-12-13 09:32:17 -08:00
README.md Update references to the new documentation 2021-12-14 09:03:29 -08:00
regs_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
regs.cc Remove OsErrorMessage in favor of Abseil's new ErrnoToStatus 2022-04-21 06:15:38 -07:00
regs.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
result.cc Full syscall info in Result::ToString 2023-01-12 03:57:44 -08:00
result.h #Cleanup: Consistently use std::make_unique 2022-10-12 05:23:42 -07:00
sandbox2_test.cc Split PtraceMonitor out of Monitor 2023-01-23 01:42:28 -08:00
sandbox2.cc Split PtraceMonitor into separate file 2023-01-30 05:09:20 -08:00
sandbox2.h Split PtraceMonitor into separate file 2023-01-30 05:09:20 -08:00
sanitizer_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
sanitizer.cc Remove OsErrorMessage in favor of Abseil's new ErrnoToStatus 2022-04-21 06:15:38 -07:00
sanitizer.h Delete deprecated ::sandbox2::Sandbox2::WaitForTsan and its remaining call sites. 2022-02-03 11:23:56 -08:00
stack_trace_test.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
stack_trace.cc stack_trace: pass fd to sandboxee's memory instead of using process_vm_readv 2023-01-19 05:44:50 -08:00
stack_trace.h stack_trace: do not add common libraries when not a custom fork-server 2023-01-19 02:47:49 -08:00
syscall_defs.cc More precise sycall_defs 2022-12-22 05:00:48 -08:00
syscall_defs.h Make code not have a -Warray-parameter warning. 2022-08-15 22:55:51 -07:00
syscall_test.cc Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
syscall.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
syscall.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
testing.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
util_test.cc Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
util.cc Remove OsErrorMessage in favor of Abseil's new ErrnoToStatus 2022-04-21 06:15:38 -07:00
util.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
violation.proto Migrate to proto3, change is_ro to is_rw (default value is false), and rename mounttree.proto 2022-03-14 05:15:15 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.