Wiktor Garbacz b350a41a10 Gather more coverage data
Switch to ForkWithFlags for InitProcess (it will not reset coverage).
Explicitly dump coverage after initial namespace setup.
Return instead of exiting from libunwind sandbox.

PiperOrigin-RevId: 563368599
Change-Id: I3b764db015a71bd091ee7b4b5b614281cbb84832
2023-09-07 02:43:04 -07:00
..
2023-09-05 00:57:27 -07:00
2023-09-05 00:57:27 -07:00
2023-09-05 00:57:27 -07:00
2023-08-24 06:23:36 -07:00
2023-08-31 05:01:51 -07:00
2023-05-04 00:46:53 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-23 09:04:00 -07:00
2023-09-04 07:00:57 -07:00
2023-09-04 07:00:57 -07:00
2023-09-04 07:00:57 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-03-08 08:09:34 -08:00
2023-09-07 02:43:04 -07:00
2023-09-07 02:43:04 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-25 06:50:29 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-03-08 08:09:34 -08:00
2023-08-23 07:14:21 -07:00
2023-08-24 06:23:36 -07:00
2023-09-07 02:43:04 -07:00
2023-09-07 02:43:04 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.