sandbox_init man page on Darwin

Man page or keyword search:  
man Server   23457 pages
apropos Keyword Search (all sections)
Output format
Darwin logo
[printable version]

SANDBOX_INIT(3)		 BSD Library Functions Manual	       SANDBOX_INIT(3)

NAME
     sandbox_init, sandbox_free_error — set process sandbox (DEPRECATED)

SYNOPSIS
     #include <sandbox.h>

     int
     sandbox_init(const char *profile, uint64_t flags, char **errorbuf);

     void
     sandbox_free_error(char *errorbuf);

DESCRIPTION
     The sandbox_init() and sandbox_free_error() functions are DEPRECATED.
     Developers who wish to sandbox an app should instead adopt the App Sand‐
     box feature described in the App Sandbox Design Guide.

     The sandbox_init() function places the current process into a sandbox(7).
     The NUL-terminated string profile specifies the profile to be used to
     configure the sandbox.  The flags specified are formed by or'ing the fol‐
     lowing values:

     SANDBOX_NAMED	     The profile argument specifies a sandbox profile
			     named by one of the constants given in the
			     AVAILABLE PROFILES section below.

     The out parameter *errorbuf will be set according to the error status.

RETURN VALUES
     Upon successful completion of sandbox_init(), a value of 0 is returned
     and *errorbuf is set to NULL.  In the event of an error, a value of -1 is
     returned and *errorbuf is set to a pointer to a NUL-terminated string
     describing the error.  This string may contain embedded newlines.	This
     error information is suitable for developers and is not intended for end
     users.  This pointer should be passed to sandbox_free_error(3) to release
     the allocated storage when it is no longer needed.

AVAILABLE PROFILES
     The following are brief descriptions of each available profile.  Keep in
     mind that sandbox(7) restrictions are typically enforced at resource
     acquisition time.

     kSBXProfileNoInternet		TCP/IP networking is prohibited.

     kSBXProfileNoNetwork		All sockets-based networking is pro‐
					hibited.

     kSBXProfileNoWrite			File system writes are prohibited.

     kSBXProfileNoWriteExceptTemporary	File system writes are restricted to
					the temporary folder /var/tmp and the
					folder specified by the confstr(3)
					configuration variable _CS_DAR‐
					WIN_USER_TEMP_DIR.

     kSBXProfilePureComputation		All operating system services are pro‐
					hibited.

SEE ALSO
     sandbox-exec(1), sandbox(7), sandboxd(8)

Mac OS X		       November 15, 2011		      Mac OS X
[top]

List of man pages available for Darwin

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net