Wiktor Garbacz 64b52ff3b5 Fix stack_trace_test for ARM64
When symbolize.cc is built with unwind tables function from the lib calling into symbolize.cc might be duplicated in stack trace (libunwind fallback to LR)

PiperOrigin-RevId: 514324815
Change-Id: I76ee4ccf5aaf388924714284d9896fa367f5f752
2023-03-06 07:07:55 -08:00
..
2023-03-06 07:07:55 -08:00
2022-11-30 05:21:12 -08:00
2023-02-15 11:35:14 -08:00
2023-01-23 01:42:28 -08:00
2022-01-28 01:39:09 -08:00
2023-02-16 07:12:46 -08:00
2022-01-28 01:39:09 -08:00
2023-02-16 06:07:15 -08:00
2023-02-16 06:07:15 -08:00
2022-12-22 05:00:48 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2023-02-16 10:44:01 -08:00
2023-02-16 10:44:01 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.