Let's try to create a simple sandbox and in turn learn the inner workings of linux security primitives like seccomp, cgroups and namespaces
You can find detailed explanations inside each folder.
At first let's try to work with seccomp which means secure computing mode.
At first we will try to run a simple c program inside a sandbox using execve
We will see how seccomp strict mode allows a very strict pool of system call
Using seccomp rules we initialize sandbox to block everything, then add rules to allow the bare minimum.
We will try to find the resource usage of the sandboxed process. We will also refactor the code to allow monitoring the child.
In this part we will limit the resource usage of the sandboxed program to a certain upper bound.