Wiktor Garbacz 59f5fa8042 Allow collecting stacktraces on normal process exit
This mainly a debugging facility.
It makes diagnosing problems where sandboxed process just randomly exits whereas unsandboxed one runs to completion due to differences in the setup/environment much easier.

PiperOrigin-RevId: 391005548
Change-Id: Ia19fe6632748da93c1f4291bb55e895f50a4e2b0
2021-08-16 03:13:15 -07:00
..
2021-08-12 08:03:52 -07:00
2021-02-19 04:43:14 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2021-05-10 07:04:04 -07:00
2020-10-05 05:10:16 -07:00
2020-01-31 05:39:25 -08:00
2021-01-22 06:01:34 -08:00
2021-02-19 04:43:14 -08:00
2021-01-22 06:01:34 -08:00
2021-07-29 05:52:19 -07:00
2021-05-20 08:17:10 -07:00
2021-05-17 04:07:08 -07:00
2021-05-10 07:04:04 -07:00
2021-01-22 06:01:34 -08:00
2019-10-07 02:36:35 -07:00
2020-09-03 07:40:33 -07:00
2021-07-29 05:52:19 -07:00
2021-01-22 06:01:34 -08:00
2021-03-18 05:56:40 -07:00
2021-06-04 01:01:34 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.