Kevin Hamacher 4da8f68aa8 Rework stacktrace mounttree logic
The previous one was not quite correct in cases where the outside binary path
did not match the inside path. This should be fixed with this.

PiperOrigin-RevId: 276075886
Change-Id: I1c7c4fa0191960437a2d2360b805c7098b1407c9
2019-10-22 09:05:33 -07:00
..
2019-08-23 08:08:51 -07:00
2019-03-18 19:00:48 +01:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-03-18 19:00:48 +01:00
2019-05-17 07:21:31 -07:00
2019-04-23 10:30:45 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-08-23 08:08:51 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-19 03:41:32 -07:00
2019-03-19 03:41:32 -07:00
2019-03-19 03:41:32 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-04-26 06:18:59 -07:00
2019-07-15 23:59:24 -07:00
2019-10-22 09:05:33 -07:00
2019-10-22 09:05:33 -07:00
2019-03-18 19:00:48 +01:00
2019-09-11 02:39:49 -07:00
2019-10-09 02:47:38 -07:00
2019-06-14 02:09:07 -07:00
2019-03-18 19:00:48 +01:00
2019-09-11 02:39:49 -07:00
2019-03-20 05:19:55 -07:00
2019-10-07 02:36:35 -07:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-09-11 02:39:49 -07:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-03-18 19:00:48 +01:00
2019-08-23 08:08:51 -07:00
2019-08-23 08:08:51 -07:00
2019-09-24 04:50:18 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.