Christian Blichmann 354cbe89f9 Add more convenience functions to PolicyBuilder
- Allow to specify multiple syscalls with `BlockSyscallsWithErrno()`
- Add functions to allow `unlink()` and `rename()` in all their spellings

PiperOrigin-RevId: 414987303
Change-Id: Ic0e680b785e8e3a3498f20e6a7403737e63fe876
2021-12-08 06:41:21 -08:00
..
2021-12-07 02:23:23 -08:00
2020-10-01 06:45:38 -07:00
2021-12-07 02:23:23 -08:00
2021-12-07 02:23:23 -08:00
2021-12-03 05:21:01 -08:00
2021-05-10 07:04:04 -07:00
2020-01-31 05:39:25 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-07-29 05:52:19 -07:00
2021-05-20 08:17:10 -07:00
2021-09-01 01:28:19 -07:00
2021-05-17 04:07:08 -07:00
2021-05-10 07:04:04 -07:00
2019-10-07 02:36:35 -07:00
2021-12-07 02:23:23 -08:00
2021-03-18 05:56:40 -07:00
2021-06-04 01:01:34 -07:00
2021-12-03 09:34:32 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.