Oliver Kunz 68eaa815ce Migrate to proto3, change is_ro to is_rw (default value is false), and rename mounttree.proto
PiperOrigin-RevId: 434435260
Change-Id: Ie4cfe04bf1a9357e63b6159c3d5a8b95388b5292
2022-03-14 05:15:15 -07:00
..
2022-02-21 00:46:50 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-03-02 06:42:42 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-02-08 06:23:52 -08:00
2022-01-28 01:39:09 -08:00
2021-06-04 01:01:34 -07:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.