Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(44)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 1253363004: ozone gbm: whitelist 3 DRM ioctl code for native GpuMemoryBuffer. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: use "unsigned int" Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 import("//testing/test.gni") 6 import("//testing/test.gni")
7 7
8 declare_args() { 8 declare_args() {
9 compile_suid_client = is_linux 9 compile_suid_client = is_linux
10 10
11 compile_credentials = is_linux 11 compile_credentials = is_linux
12 12
13 # On Android, use plain GTest. 13 # On Android, use plain GTest.
14 use_base_test_suite = is_linux 14 use_base_test_suite = is_linux
15
16 use_vgem_map = false
15 } 17 }
16 18
17 # We have two principal targets: sandbox and sandbox_linux_unittests 19 # We have two principal targets: sandbox and sandbox_linux_unittests
18 # All other targets are listed as dependencies. 20 # All other targets are listed as dependencies.
19 # There is one notable exception: for historical reasons, chrome_sandbox is 21 # There is one notable exception: for historical reasons, chrome_sandbox is
20 # the setuid sandbox and is its own target. 22 # the setuid sandbox and is its own target.
21 23
22 group("sandbox") { 24 group("sandbox") {
23 deps = [ 25 deps = [
24 ":sandbox_services", 26 ":sandbox_services",
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after
230 "seccomp-bpf-helpers/syscall_sets.cc", 232 "seccomp-bpf-helpers/syscall_sets.cc",
231 "seccomp-bpf-helpers/syscall_sets.h", 233 "seccomp-bpf-helpers/syscall_sets.h",
232 ] 234 ]
233 defines = [ "SANDBOX_IMPLEMENTATION" ] 235 defines = [ "SANDBOX_IMPLEMENTATION" ]
234 236
235 deps = [ 237 deps = [
236 "//base", 238 "//base",
237 ":sandbox_services", 239 ":sandbox_services",
238 ":seccomp_bpf", 240 ":seccomp_bpf",
239 ] 241 ]
242
243 if (use_vgem_map) {
244 defines += [ "USE_VGEM_MAP" ]
245 }
240 } 246 }
241 247
242 if (is_linux) { 248 if (is_linux) {
243 # The setuid sandbox for Linux. 249 # The setuid sandbox for Linux.
244 executable("chrome_sandbox") { 250 executable("chrome_sandbox") {
245 sources = [ 251 sources = [
246 "suid/common/sandbox.h", 252 "suid/common/sandbox.h",
247 "suid/common/suid_unsafe_environment_variables.h", 253 "suid/common/suid_unsafe_environment_variables.h",
248 "suid/process_util.h", 254 "suid/process_util.h",
249 "suid/process_util_linux.c", 255 "suid/process_util_linux.c",
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after
385 # 'type': 'none', 391 # 'type': 'none',
386 # 'variables': { 392 # 'variables': {
387 # 'test_suite_name': 'sandbox_linux_jni_unittests', 393 # 'test_suite_name': 'sandbox_linux_jni_unittests',
388 # }, 394 # },
389 # 'dependencies': [ 395 # 'dependencies': [
390 # 'sandbox_linux_jni_unittests', 396 # 'sandbox_linux_jni_unittests',
391 # ], 397 # ],
392 # 'includes': [ '../../build/apk_test.gypi' ], 398 # 'includes': [ '../../build/apk_test.gypi' ],
393 # } 399 # }
394 } 400 }
OLDNEW
« no previous file with comments | « no previous file | sandbox/linux/sandbox_linux.gypi » ('j') | sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698