Add an ELF loader that can load and run an executable in the sandbox

This can load both statically-linked executables and ld.so (the
dynamic linker).  These have to be pre-patched to do syscalls via
"int $0" - I will add a tool for doing this patching in another change.

The ELF loader itself also runs with sandboxing enabled.

Currently the loader is dynamically linked against glibc, which will
probably cause problems when another copy of libc gets loaded into the
process, so in the long term we will want to statically link the
loader.

BUG=http://code.google.com/p/seccompsandbox/issues/detail?id=13
TEST=to be added in a later change

Review URL: http://codereview.chromium.org/7634024

git-svn-id: http://seccompsandbox.googlecode.com/svn/trunk@171 55e79e8e-603c-11de-8c10-5fe6993ea61f
2 files changed