Christian Blichmann f928f1dd7c Fix stack traces on Fedora
This fixes the main issue (#118) with stack traces on Fedora, which uses a
`/lib64` and `/usr/lib64`.

PiperOrigin-RevId: 437717858
Change-Id: I6986aa84c2be57ae1d9f8d0cb9b508768d27f1c1
2022-03-28 04:05:36 -07:00
..
2022-02-21 00:46:50 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-03-02 06:42:42 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-03-28 04:05:36 -07:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00
2022-01-28 01:39:09 -08:00

Sandbox2

Sandbox2 is a C++ security sandbox for Linux which can be used to run untrusted programs or portions of programs in confined environments. The idea is that the runtime environment is so restricted that security bugs such as buffer overflows in the protected region cause no harm.

Documentation

Detailed developer documentation is available on the Google Developers site for Sandboxed API under Sandbox2.

There is also a Getting Started guide for Sandbox2.