commit | cd93d2b4e181e967e6576bfa8221ebccc5395852 | [log] [tgz] |
---|---|---|
author | Will Harris <wfh@chromium.org> | Mon Jul 22 22:31:18 2024 |
committer | Copybara-Service <copybara-worker@google.com> | Wed Jul 24 13:26:46 2024 |
tree | f2c38767dcdfb1f56090418008a0d52ece0b8d64 | |
parent | a0d2b64ec4b9f818464bab7882508e2205f8d3c8 [diff] |
Reland "Temporarily disable network sandbox on arm64" This reverts commit 6bca34fcefb277d411589619deb049801f02f636. Reason for revert: Not all bots are fixed yet Original change's description: > Revert "Temporarily disable network sandbox on arm64" > > This reverts commit 81ac118b8e6b26bb3f1db08a86e57a884500b8a9. > > Reason for revert: This issue is fixed > > Original change's description: > > Temporarily disable network sandbox on arm64 > > > > While the root cause for the failures to launch LPAC are being > > diagnosed on Windows, temporarily disable the sandbox. > > > > BUG=40223285 > > > > Change-Id: I0184d7d6a325530ade8a2fd2b58712e001b3e0f8 > > Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5589736 > > Reviewed-by: Kuan Huang <kuanhuang@chromium.org> > > Commit-Queue: Will Harris <wfh@chromium.org> > > Cr-Commit-Position: refs/heads/main@{#1308946} > > Bug: 40223285 > Change-Id: I582a2c24d41ede9938eaef54485fe45e561eb16e > Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5722013 > Commit-Queue: Will Harris <wfh@chromium.org> > Reviewed-by: James Forshaw <forshaw@chromium.org> > Cr-Commit-Position: refs/heads/main@{#1330461} Bug: 40223285, 354748632 Change-Id: I8c40a0d4eb51c3ad24540bda46fc10dcc18b7b6b Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5731625 Commit-Queue: Will Harris <wfh@chromium.org> Bot-Commit: Rubber Stamper <rubber-stamper@appspot.gserviceaccount.com> Reviewed-by: James Forshaw <forshaw@chromium.org> Cr-Commit-Position: refs/heads/main@{#1331386} NOKEYCHECK=True GitOrigin-RevId: 750257f9fd6e539745a1b13daa23a5055fe3205f
This directory contains platform-specific sandboxing libraries. Sandboxing is a technique that can improve the security of an application by separating untrustworthy code (or code that handles untrustworthy data) and restricting its privileges and capabilities.
Each platform relies on the operating system's process primitive to isolate code into distinct security principals, and platform-specific technologies are used to implement the privilege reduction. At a high-level:
mac/
uses the Seatbelt sandbox. See the detailed design for more.linux/
uses namespaces and Seccomp-BPF. See the detailed design for more.win/
uses a combination of restricted tokens, distinct job objects, alternate desktops, and integrity levels. See the detailed design for more.Built on top of the low-level sandboxing library is the //sandbox/policy
component, which provides concrete policies and helper utilities for sandboxing specific Chromium processes and services. The core sandbox library cannot depend on the policy component.