Wiktor Garbacz 15fb5b9608 Allow sigaltstack
`absl::GetStackTrace` on Aarch64 since
bb7bbb12c7 will call sigaltstack.

PiperOrigin-RevId: 581914257
Change-Id: I316bdd64d1cef8a6327838681bda0067a0dc50fc
2023-11-13 04:22:29 -08:00
..
2023-11-13 04:22:29 -08:00
2023-09-18 00:46:50 -07:00
2023-08-24 06:23:36 -07:00
2023-11-10 07:27:10 -08:00
2023-05-04 00:46:53 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-23 09:04:00 -07:00
2023-09-26 05:45:27 -07:00
2023-09-26 05:45:27 -07:00
2023-08-24 06:23:36 -07:00
2023-03-08 08:09:34 -08:00
2023-09-07 02:43:04 -07:00
2023-09-24 23:47:01 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-09-15 04:57:24 -07:00
2022-01-28 01:39:09 -08:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-25 06:50:29 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-24 06:23:36 -07:00
2023-08-23 07:14:21 -07:00
2023-08-24 06:23:36 -07:00
2023-09-07 03:09:30 -07:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.