Christian Blichmann 6587e571f1 Skip entries with zero inode when parsing /proc/PID/maps
This also skips all entries that point to deleted files.

PiperOrigin-RevId: 344244273
Change-Id: Ic47c6ab0dff4eaf4b4dea2779c45685922adc608
2020-11-25 06:46:39 -08:00
..
2020-11-19 08:37:41 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-11-25 06:15:29 -08:00
2020-10-01 06:45:38 -07:00
2020-10-01 06:45:38 -07:00
2020-09-11 06:34:27 -07:00
2020-11-05 08:48:03 -08:00
2020-10-05 05:10:16 -07:00
2020-01-31 05:39:25 -08:00
2020-09-11 06:34:27 -07:00
2020-09-11 06:34:27 -07:00
2020-07-01 08:23:46 -07:00
2019-10-07 02:36:35 -07:00
2020-09-11 06:34:27 -07:00
2020-09-11 06:34:27 -07:00
2020-07-20 00:24:40 -07:00
2020-09-03 07:40:33 -07:00
2020-09-03 07:40:33 -07:00
2020-07-20 00:24:40 -07:00
2020-09-11 06:34:27 -07:00
2020-05-29 05:40:52 -07:00
2020-10-15 13:25:30 -07:00
2020-09-03 07:40:33 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.