Change network process sandbox to apply default mitigations.
No sandbox isolation policies are being applied, but the default process mitigations will now be in place when the sandbox is enabled. The sandbox will be enabled by feature flag. Before: DEP (permanent) ASLR (high entropy) CF Guard After (when enabled): DEP (permanent) ASLR (high entropy) Dynamic code prohibited Strict handle checks Extension points disabled CF Guard Signatures restricted (Microsoft only) Non-system fonts disabled Images restricted (remote images, low mandatory label images) This also adds 4Gb job process limit. BUG=841001,920727 Change-Id: I9dc1213615e621a321b3da42772fa68d5bea3394 Reviewed-on: https://chromium-review.googlesource.com/c/1481658 Commit-Queue: Will Harris <wfh@chromium.org> Reviewed-by:John Abd-El-Malek <jam@chromium.org> Cr-Commit-Position: refs/heads/master@{#636192}
Showing
Please register or sign in to comment