sandboxed-api/sandboxed_api/sandbox2
Sandboxed API Team 9b85dc49c1 Split sanitizer.h into a separate library
PiperOrigin-RevId: 305327952
Change-Id: I6708729d379d019c3d299e9cb54b76338ced23bf
2020-04-07 13:26:51 -07:00
..
examples Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
network_proxy Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
testcases Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
unwind Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
util Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
bpfdisassembler.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
bpfdisassembler.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
buffer_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
buffer.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
buffer.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
BUILD.bazel Split sanitizer.h into a separate library 2020-04-07 13:26:51 -07:00
client.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
client.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
CMakeLists.txt Split sanitizer.h into a separate library 2020-04-07 13:26:51 -07:00
comms_test.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
comms_test.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
comms.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
comms.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
executor.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
executor.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkingclient.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkingclient.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver_bin.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
forkserver.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
forkserver.proto Internal change 2020-01-31 05:39:25 -08:00
global_forkclient.cc Replace if (!cond) { LOG(FATAL, msg) } with CHECK(cond, msg) 2020-01-28 05:59:33 -08:00
global_forkclient.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
ipc_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
ipc.cc Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
ipc.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
limits_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
limits.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logserver.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logsink.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
logsink.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
monitor.cc Qualify uses of std::string 2020-02-27 00:03:55 -08:00
monitor.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
mounts_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
mounts.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
mounts.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
mounttree.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
namespace_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
namespace.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
namespace.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
notify_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
notify.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
policy_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
policy.cc Qualify uses of std::string 2020-02-27 00:03:55 -08:00
policy.h Now network proxy server supports IP filtering. API to policybuilder is added to make a list of allowed pairs of allowed IP, mask and port where mask and port are optional. 2020-02-20 07:45:44 -08:00
policybuilder_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
policybuilder.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
policybuilder.h Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
README.md Corrects typo in link 2019-10-07 02:36:35 -07:00
regs.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
regs.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
result.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
result.h Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
sandbox2_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sandbox2.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
sandbox2.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
sanitizer.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
stack_trace_test.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
stack_trace.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
stack_trace.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall_defs.cc Cleanup calls to sapi::StatusOr<>::ValueOrDie() 2020-04-02 07:42:45 -07:00
syscall_defs.h Refactor syscall definitions to rely less on macros 2020-01-07 05:27:21 -08:00
syscall_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
syscall.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
testing.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
testing.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
util_test.cc Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
util.cc Replace sapi::Status with absl::Status 2020-02-27 09:24:12 -08:00
util.h Update license header with recommended best practices 2020-01-17 05:05:29 -08:00
violation.proto Update license header with recommended best practices 2020-01-17 05:05:29 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.