Skip to content

Instantly share code, notes, and snippets.

@himanshudas
Created July 13, 2019 08:54
Show Gist options
  • Save himanshudas/6e78229d667842ec988a04cc849c5763 to your computer and use it in GitHub Desktop.
Save himanshudas/6e78229d667842ec988a04cc849c5763 to your computer and use it in GitHub Desktop.
https://eigenstate.org/notes/seccomp
https://github.com/gparent/seccomp-helloworld
http://doger.io/
https://ghedo.github.io/pflask/
https://github.com/CodethinkLabs/sandboxlib
http://opensourceforu.com/2016/07/many-approaches-sandboxing-linux/
www.insanitybit.com/2014/09/08/3719/
http://stackoverflow.com/questions/40107782/how-to-seccomp-a-subprocess
https://s3hh.wordpress.com/2012/07/24/playing-with-seccomp/
https://blog.yadutaf.fr/2014/05/29/introduction-to-seccomp-bpf-linux-syscall-filter/
https://www.kernel.org/doc/Documentation/prctl/seccomp_filter.txt
https://github.com/torvalds/linux/tree/master/samples/seccomp
http://www.paul-moore.com/docs/devconf-syscall_filtering-pmoore-012014-r1.pdf
http://www.paul-moore.com/presentations
http://blog.viraptor.info/post/seccomp-sandboxes-and-memcached-example-part-1
https://github.com/stef/cr3/blob/master/sig/sandbox.c
https://www.chromium.org/chromium-os/developer-guide/chromium-os-sandboxing
http://blog.rchapman.org/posts/Linux_System_Call_Table_for_x86_64/
https://chromium.googlesource.com/chromiumos/platform/minijail/
http://blog.johngoulah.com/tag/seccomp/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment