| commit | 11ff5368478ff9856ad11135241da544a5f95f11 | [log] [tgz] |
|---|---|---|
| author | Nir Chachamovitz <nir.chachamovitz@island.io> | Mon Dec 01 21:38:59 2025 |
| committer | Copybara-Service <copybara-worker@google.com> | Mon Dec 01 21:44:04 2025 |
| tree | 2d5198944b3a5542608dfa62cab87e81c6435fbd | |
| parent | 4d9db17ade30297bd91c98dbd594eb007c68d342 [diff] |
fix arm64 is_running_in_vm_ value base/cpu.h initializes is_running_in_vm_ to false, and it is only modified when running on ARCH_CPU_X86_FAMILY. Therefore, in Mac VMs, this boolean always remains false. Introduced due to recent bug in Mac 26.1, in which the serial number published for the virtual machine is 0. Bug: 463283603 Change-Id: Ib84921481fba5fa4eceea6ac2078e49635849e49 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/7201806 Reviewed-by: Francois Pierre Doray <fdoray@chromium.org> Commit-Queue: Michael Maltsev <michaelm@island.io> Reviewed-by: Mark Mentovai <mark@chromium.org> Cr-Commit-Position: refs/heads/main@{#1552404} NOKEYCHECK=True GitOrigin-RevId: f73d3334c3b952065cdc8c325d21398d5a59a72d
This directory contains platform-specific sandboxing libraries. Sandboxing is a technique that can improve the security of an application by separating untrustworthy code (or code that handles untrustworthy data) and restricting its privileges and capabilities.
Each platform relies on the operating system's process primitive to isolate code into distinct security principals, and platform-specific technologies are used to implement the privilege reduction. At a high-level:
mac/ uses the Seatbelt sandbox. See the detailed design for more.linux/ uses namespaces and Seccomp-BPF. See the detailed design for more.win/ uses a combination of restricted tokens, distinct job objects, alternate desktops, and integrity levels. See the detailed design for more.Built on top of the low-level sandboxing library is the //sandbox/policy component, which provides concrete policies and helper utilities for sandboxing specific Chromium processes and services. The core sandbox library cannot depend on the policy component.