Google's Chromium sandbox
Google's Chromium sandbox
Posted Aug 19, 2009 20:54 UTC (Wed) by kjp (guest, #39639)Parent article: Google's Chromium sandbox
Was there consideration of using x86 ring 1 or 2 for this purpose? Is that too architecture dependent?
Anyway... still an interesting idea. The syscall table looks refreshingly small. I noticed things like socket, connect aren't in there... I take it the network IO is still running in the trusted/main process?
Posted Aug 19, 2009 22:03 UTC (Wed)
by agl (guest, #4541)
[Link]
Also, you're correct that all network IO runs in the main browser process.
Posted Aug 19, 2009 22:22 UTC (Wed)
by ikm (guest, #493)
[Link]
Google's Chromium sandbox
would require changes in the kernel. The beauty of seccomp is that it's been
in the kernel for several years now and is quite widely deployed.
This is actually a little unfortunate: it would be best to have a separate,
sandboxed process for that but, alas, that's only a wishlist item for now.
Google's Chromium sandbox