sandboxed-api/sandboxed_api/sandbox2
Sandboxed API Team c6bab97690 Added more descriptive Syscall argument types, and an API for introspecting arguments.
PiperOrigin-RevId: 612904089
Change-Id: Ia0ef7b0559f7eed923981b13fa8224bc891e8c37
2024-03-05 11:07:06 -08:00
..
examples Introduce and prefer AllowMmapWithoutExec 2023-12-27 02:51:13 -08:00
network_proxy Use empty instead of length 2023-09-18 00:46:50 -07:00
testcases Use sandboxed libunwind also with sanitizers 2024-02-27 04:36:56 -08:00
unwind Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
util Internal change 2023-11-10 07:27:10 -08:00
allow_all_syscalls.h Fix typo 2023-05-04 00:46:53 -07:00
allow_unrestricted_networking.h Sandbox2: Remove commented out include 2023-06-23 00:46:59 -07:00
bpfdisassembler_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
bpfdisassembler.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
bpfdisassembler.h Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
buffer_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
buffer.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
buffer.h Remove Tag constructor, add standard comment for absl::WrapUnique(new T) 2022-10-25 06:20:51 -07:00
BUILD.bazel Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
client.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
client.h IWYU fixes 2023-08-23 09:04:00 -07:00
CMakeLists.txt Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
comms_test.cc Remove deprecated comms functions 2023-09-26 05:45:27 -07:00
comms_test.proto Migration of remaining protobufs from proto2 to proto3 2022-03-16 00:43:46 -07:00
comms.cc Comms: Always use the inline buffer 2024-02-14 07:12:51 -08:00
comms.h Remove deprecated comms functions 2023-09-26 05:45:27 -07:00
executor.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
executor.h Do 1 level of recursion on libunwind crashes 2023-09-19 06:50:05 -07:00
fork_client.cc Add special handling for global forkserver 2023-12-13 03:34:22 -08:00
fork_client.h Add special handling for global forkserver 2023-12-13 03:34:22 -08:00
forkingclient.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
forkingclient.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
forkserver_bin.cc Gather more coverage data 2023-09-07 02:43:04 -07:00
forkserver_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
forkserver.cc don't drop CAP_SYS_PTRACE as it is apparently needed by sandbox 2023-11-02 00:42:33 -07:00
forkserver.h Always override forkservers comms_fd in sandboxee 2023-08-30 02:20:56 -07:00
forkserver.proto Treat libunwind sandbox as a ~regular sandboxee 2023-08-17 13:32:44 -07:00
global_forkclient_lib_ctor.cc Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
global_forkclient.cc SAPI_RAW_CHECK expects NUL-terminated strings 2023-11-29 01:03:45 -08:00
global_forkclient.h Add special handling for global forkserver 2023-12-13 03:34:22 -08:00
ipc_test.cc Run more tests with sanitizers and coverage 2023-09-05 07:14:49 -07:00
ipc.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
ipc.h Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
limits_test.cc Skip sanitizers for limits_test 2023-09-15 04:57:24 -07:00
limits.h Change license link to HTTPS URL 2022-01-28 01:39:09 -08:00
logserver.cc Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
logserver.h Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
logserver.proto logserver: Support non-UTF8 log messages 2023-12-28 06:35:09 -08:00
logsink.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
logsink.h Use Abseil's log/flags instead of glog/gflags 2022-10-20 06:48:51 -07:00
monitor_base.cc Add special handling for global forkserver 2023-12-13 03:34:22 -08:00
monitor_base.h Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
monitor_ptrace.cc PtraceMonitor: Add a hard deadline for waiting for kill to take effect 2023-09-06 04:38:51 -07:00
monitor_ptrace.h PtraceMonitor: Add a hard deadline for waiting for kill to take effect 2023-09-06 04:38:51 -07:00
monitor_unotify.cc Reduce CHECK-failures in unotify monitor 2023-08-30 02:56:16 -07:00
monitor_unotify.h Reduce CHECK-failures in unotify monitor 2023-08-30 02:56:16 -07:00
mount_tree.proto Migrate to proto3, change is_ro to is_rw (default value is false), and rename mounttree.proto 2022-03-14 05:15:15 -07:00
mounts_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
mounts.cc Minor cleanups, no functional change. 2023-12-27 13:39:58 -08:00
mounts.h Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
namespace_test.cc namespace_test: use lstat instead of stat, don't descent into procfs & sysfs 2023-09-14 02:09:12 -07:00
namespace.cc Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
namespace.h Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
network_proxy_test.cc NetworkProxyTest: test more error conditions 2023-09-05 02:17:25 -07:00
notify_test.cc Add DefaultAction(TraceAllSyscalls) variant to PolicyBuilder 2024-02-02 13:01:37 -08:00
notify.h Remove unneeded include 2023-12-29 01:30:29 -08:00
policy_test.cc Ensure that TCMalloc can execute NumCPUs. 2023-09-15 08:21:13 -07:00
policy.cc Return ENOSYS instead of hard denying clone3 2024-02-01 04:39:02 -08:00
policy.h Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
policybuilder_test.cc PolicyBuilder: ignore duplicate calls to more complex helpers 2024-02-19 06:14:02 -08:00
policybuilder.cc PolicyBuilder: ignore duplicate calls to more complex helpers 2024-02-19 06:14:02 -08:00
policybuilder.h Adding API for getting the current PolicyBuilder status. 2024-03-05 10:35:54 -08:00
README.md Update references to the new documentation 2021-12-14 09:03:29 -08:00
regs_test.cc Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
regs.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
regs.h Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
result.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
result.h Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
sandbox2_test.cc Add a test for custom forkserver 2023-12-12 06:53:33 -08:00
sandbox2.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
sandbox2.h Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
sanitizer_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
sanitizer.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
sanitizer.h Final round of IWYU fixes for Sandbox2 2023-08-25 06:50:29 -07:00
stack_trace_test.cc Use sandboxed libunwind also with sanitizers 2024-02-27 04:36:56 -08:00
stack_trace.cc Use sandboxed libunwind also with sanitizers 2024-02-27 04:36:56 -08:00
stack_trace.h Do 1 level of recursion on libunwind crashes 2023-09-19 06:50:05 -07:00
syscall_defs.cc Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
syscall_defs.h Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
syscall_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
syscall.cc Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
syscall.h Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
testing.h Add IWYU pragma 2023-08-23 07:14:21 -07:00
trace_all_syscalls.h Add DefaultAction(TraceAllSyscalls) variant to PolicyBuilder 2024-02-02 13:01:37 -08:00
util_test.cc Bulk IWYU and build_cleaner fixes 2023-08-24 06:23:36 -07:00
util.cc Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
util.h Added more descriptive Syscall argument types, and an API for introspecting arguments. 2024-03-05 11:07:06 -08:00
violation.proto Add field to track policy source location 2023-02-24 07:55:23 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.