Revert "[fuchsia] Permit PerfettoBridge capabilities for Chrome and WebEngine."

This reverts commit 6d71e11f38cbd14528b53f268cb41a203f039650.

Reason for revert: Introduces a new "required" capability to the CML,
which breaks embedders of the that have not provided
the capability.  Reverting to unblock the Chromium roll; the change
could be re-landed without the CML update, and that landed
separately once we have suitable verification in-place.

Original change's description:
> [fuchsia] Permit PerfettoBridge capabilities for Chrome and WebEngine.
> Enables Chrome and WebEngine to communicate with the Perfetto
> ProducerConnector FIDL interface.
> Adds sandbox entries so that all child processes may connect
> directly with the Producer endpoint without a Mojo intermediary
> (a la Android).
> Bug: 1166873
> Change-Id: Ic111e39eed1cf3fbe9583634cb3531e3ad369b8f
> Reviewed-on:
> Reviewed-by: Tom Sepez <>
> Auto-Submit: Kevin Marshall <>
> Commit-Queue: Kevin Marshall <>
> Reviewed-by: David Dorwin <>
> Reviewed-by: Primiano Tucci <>
> Reviewed-by: Wez <>
> Cr-Commit-Position: refs/heads/main@{#1016822}

Bug: 1166873, 103442
Change-Id: I9f1dad2f1fd3d1f770cdbffed2c13f64d70d9890
Auto-Submit: Wez <>
Reviewed-by: Tom Sepez <>
Reviewed-by: Kevin Marshall <>
Commit-Queue: Rohan Pavone <>
Reviewed-by: Rohan Pavone <>
Cr-Commit-Position: refs/heads/main@{#1018851}
GitOrigin-RevId: 90185e5aac48b24c7412504a47720b6408dbd00e
3 files changed
tree: 6e1e53e19dbac342339b8f153b18b577ecc8f5a4
  1. linux/
  2. mac/
  3. policy/
  4. win/
  7. constants.h
  8. DEPS
  11. features.gni
  12. features.h
  13. ipc.dict
  14. OWNERS
  16. sandbox_export.h

Sandbox Library

This directory contains platform-specific sandboxing libraries. Sandboxing is a technique that can improve the security of an application by separating untrustworthy code (or code that handles untrustworthy data) and restricting its privileges and capabilities.

Each platform relies on the operating system's process primitive to isolate code into distinct security principals, and platform-specific technologies are used to implement the privilege reduction. At a high-level:

  • mac/ uses the Seatbelt sandbox. See the detailed design for more.
  • linux/ uses namespaces and Seccomp-BPF. See the detailed design for more.
  • win/ uses a combination of restricted tokens, distinct job objects, alternate desktops, and integrity levels. See the detailed design for more.

Built on top of the low-level sandboxing library is the //sandbox/policy component, which provides concrete policies and helper utilities for sandboxing specific Chromium processes and services. The core sandbox library cannot depend on the policy component.