Christian Blichmann c2631d88ae Improve syscall argument printing for x86-64
Updates syscall arguments mostly according to this list and more recent kernel sources:
https://chromium.googlesource.com/chromiumos/docs/+/master/constants/syscalls.md#x86_64-64_bit

The list includes some more syscalls that were recently added.

Follow-up changes will do the same for x86-32, POWER and AArch64.

PiperOrigin-RevId: 341016698
Change-Id: If1771fd37a47b227ca8f572704a64190e4621a38
2020-11-06 02:55:13 -08:00
..
2020-07-20 00:24:40 -07:00
2020-10-15 13:25:30 -07:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-11-05 08:48:03 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-09-11 06:34:27 -07:00
2020-11-05 08:48:03 -08:00
2020-10-05 05:10:16 -07:00
2020-01-31 05:39:25 -08:00
2020-09-11 06:34:27 -07:00
2020-09-11 06:34:27 -07:00
2020-07-01 08:23:46 -07:00
2019-10-07 02:36:35 -07:00
2020-09-11 06:34:27 -07:00
2020-09-11 06:34:27 -07:00
2020-07-20 00:24:40 -07:00
2020-09-03 07:40:33 -07:00
2020-09-03 07:40:33 -07:00
2020-07-20 00:24:40 -07:00
2020-09-11 06:34:27 -07:00
2020-05-29 05:40:52 -07:00
2020-10-15 13:25:30 -07:00
2020-09-03 07:40:33 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.