Source

pypy / pypy / doc / config / translation.sandbox.txt

Generate a special fully-sandboxed executable.

The fully-sandboxed executable cannot be run directly, but
only as a subprocess of an outer "controlling" process.  The
sandboxed process is "safe" in the sense that it doesn't do
any library or system call - instead, whenever it would like
to perform such an operation, it marshals the operation name
and the arguments to its stdout and it waits for the
marshalled result on its stdin.  This controller process must
handle these operation requests, in any way it likes, allowing
full virtualization.

For examples of controller processes, see
``pypy/translator/sandbox/interact.py`` and
``pypy/translator/sandbox/pypy_interact.py``.
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.