Reland "Temporarily disable network sandbox on arm64"

This reverts commit 6bca34fcefb277d411589619deb049801f02f636.

Reason for revert: Not all bots are fixed yet

Original change's description:
> Revert "Temporarily disable network sandbox on arm64"
>
> This reverts commit 81ac118b8e6b26bb3f1db08a86e57a884500b8a9.
>
> Reason for revert: This issue is fixed
>
> Original change's description:
> > Temporarily disable network sandbox on arm64
> >
> > While the root cause for the failures to launch LPAC are being
> > diagnosed on Windows, temporarily disable the sandbox.
> >
> > BUG=40223285
> >
> > Change-Id: I0184d7d6a325530ade8a2fd2b58712e001b3e0f8
> > Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5589736
> > Reviewed-by: Kuan Huang <kuanhuang@chromium.org>
> > Commit-Queue: Will Harris <wfh@chromium.org>
> > Cr-Commit-Position: refs/heads/main@{#1308946}
>
> Bug: 40223285
> Change-Id: I582a2c24d41ede9938eaef54485fe45e561eb16e
> Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5722013
> Commit-Queue: Will Harris <wfh@chromium.org>
> Reviewed-by: James Forshaw <forshaw@chromium.org>
> Cr-Commit-Position: refs/heads/main@{#1330461}

Bug: 40223285, 354748632
Change-Id: I8c40a0d4eb51c3ad24540bda46fc10dcc18b7b6b
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/5731625
Commit-Queue: Will Harris <wfh@chromium.org>
Bot-Commit: Rubber Stamper <rubber-stamper@appspot.gserviceaccount.com>
Reviewed-by: James Forshaw <forshaw@chromium.org>
Cr-Commit-Position: refs/heads/main@{#1331386}
NOKEYCHECK=True
GitOrigin-RevId: 750257f9fd6e539745a1b13daa23a5055fe3205f
1 file changed
tree: f2c38767dcdfb1f56090418008a0d52ece0b8d64
  1. linux/
  2. mac/
  3. policy/
  4. win/
  5. BUILD.gn
  6. COMMON_METADATA
  7. constants.h
  8. DEPS
  9. DIR_METADATA
  10. features.cc
  11. features.gni
  12. features.h
  13. OWNERS
  14. README.md
  15. sandbox_export.h
README.md

Sandbox Library

This directory contains platform-specific sandboxing libraries. Sandboxing is a technique that can improve the security of an application by separating untrustworthy code (or code that handles untrustworthy data) and restricting its privileges and capabilities.

Each platform relies on the operating system's process primitive to isolate code into distinct security principals, and platform-specific technologies are used to implement the privilege reduction. At a high-level:

  • mac/ uses the Seatbelt sandbox. See the detailed design for more.
  • linux/ uses namespaces and Seccomp-BPF. See the detailed design for more.
  • win/ uses a combination of restricted tokens, distinct job objects, alternate desktops, and integrity levels. See the detailed design for more.

Built on top of the low-level sandboxing library is the //sandbox/policy component, which provides concrete policies and helper utilities for sandboxing specific Chromium processes and services. The core sandbox library cannot depend on the policy component.