Sandboxed API Team 9f2ba9d6a1 Comms constructor for non abstract sockets
Allows to create a Comms with unix domain sockets that are not abstract. This allows to use Comms to talk across network namespaces

PiperOrigin-RevId: 518854724
Change-Id: I4fd65466bba9512f448b73bde367f38a0fbb584d
2023-03-23 07:34:32 -07:00
..
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-01-23 01:42:28 -08:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-03-15 03:29:56 -07:00
2023-03-08 08:09:34 -08:00
2023-03-08 08:09:34 -08:00
2023-02-16 06:07:15 -08:00
2022-12-22 05:00:48 -08:00
2023-03-08 08:09:34 -08:00
2023-03-14 00:04:14 -07:00
2023-02-16 10:44:01 -08:00
2023-02-16 10:44:01 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.