Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(85)

Side by Side Diff: docs/linux_sandboxing.md

Issue 1473953002: Fix various issues with Markdown docs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « docs/linux_debugging.md ('k') | docs/shift_based_development.md » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Linux Sandboxing 1 # Linux Sandboxing
2 2
3 Chromium uses a multiprocess model, which allows to give different privileges 3 Chromium uses a multiprocess model, which allows to give different privileges
4 and restrictions to different parts of the browser. For instance, we want 4 and restrictions to different parts of the browser. For instance, we want
5 renderers to run with a limited set of privileges since they process untrusted 5 renderers to run with a limited set of privileges since they process untrusted
6 input and are likely to be compromised. Renderers will use an IPC mechanism to 6 input and are likely to be compromised. Renderers will use an IPC mechanism to
7 request access to resource from a more privileged (browser process). 7 request access to resource from a more privileged (browser process).
8 You can find more about this general design 8 You can find more about this general design
9 [here](http://dev.chromium.org/developers/design-documents/sandbox). 9 [here](http://dev.chromium.org/developers/design-documents/sandbox).
10 10
(...skipping 122 matching lines...) Expand 10 before | Expand all | Expand 10 after
133 Available since 133 Available since
134 [r26257](http://src.chromium.org/viewvc/chrome?view=rev&revision=26257), 134 [r26257](http://src.chromium.org/viewvc/chrome?view=rev&revision=26257),
135 more information in 135 more information in
136 [this blog post](http://www.imperialviolet.org/2009/07/14/selinux.html) (grep 136 [this blog post](http://www.imperialviolet.org/2009/07/14/selinux.html) (grep
137 for 'dynamic' since dynamic transitions are a little obscure in SELinux) 137 for 'dynamic' since dynamic transitions are a little obscure in SELinux)
138 138
139 ## Developing and debugging with sandboxing 139 ## Developing and debugging with sandboxing
140 140
141 Sandboxing can make developing harder, see: 141 Sandboxing can make developing harder, see:
142 142
143 * [this page](https://code.google.com/p/chromium/wiki/LinuxSUIDSandboxDevelopm ent) 143 * [this page](linux_suid_sandbox_development.md) for the `setuid` sandbox
144 for the `setuid` sandbox
145 * [this page](http://www.chromium.org/for-testers/bug-reporting-guidelines/han ging-tabs) 144 * [this page](http://www.chromium.org/for-testers/bug-reporting-guidelines/han ging-tabs)
146 for triggering crashes 145 for triggering crashes
147 * [this page for debugging tricks](linux_debugging.md) 146 * [this page for debugging tricks](linux_debugging.md)
148 147
149 ## See also 148 ## See also
150 149
151 * [LinuxSandboxIPC](linux_sandbox_ipc.md) 150 * [LinuxSandboxIPC](linux_sandbox_ipc.md)
152 * [How Chromium's Linux sandbox affects Native Client](https://code.google.com /p/nativeclient/wiki/LinuxOuterSandbox) 151 * [How Chromium's Linux sandbox affects Native Client](https://code.google.com /p/nativeclient/wiki/LinuxOuterSandbox)
OLDNEW
« no previous file with comments | « docs/linux_debugging.md ('k') | docs/shift_based_development.md » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698