Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(92)

Side by Side Diff: sandbox/linux/sandbox_linux.gypi

Issue 2291783002: seccomp-bpf-helpers: Fix undefined reference (Closed)
Patch Set: replicating changes in gyp files Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/linux/BUILD.gn ('k') | services/shell/runner/host/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 { 5 {
6 'variables': { 6 'variables': {
7 'conditions': [ 7 'conditions': [
8 ['OS=="linux"', { 8 ['OS=="linux"', {
9 'compile_suid_client': 1, 9 'compile_suid_client': 1,
10 'compile_credentials': 1, 10 'compile_credentials': 1,
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
47 'conditions': [ 47 'conditions': [
48 [ 'compile_suid_client==1', { 48 [ 'compile_suid_client==1', {
49 'dependencies': [ 49 'dependencies': [
50 'suid_sandbox_client', 50 'suid_sandbox_client',
51 ], 51 ],
52 }], 52 }],
53 # Compile seccomp BPF when we support it. 53 # Compile seccomp BPF when we support it.
54 [ 'use_seccomp_bpf==1', { 54 [ 'use_seccomp_bpf==1', {
55 'dependencies': [ 55 'dependencies': [
56 'seccomp_bpf', 56 'seccomp_bpf',
57 'seccomp_bpf_helpers',
58 ], 57 ],
59 }], 58 }],
60 ], 59 ],
61 }, 60 },
62 { 61 {
63 'target_name': 'sandbox_linux_test_utils', 62 'target_name': 'sandbox_linux_test_utils',
64 'type': 'static_library', 63 'type': 'static_library',
65 'dependencies': [ 64 'dependencies': [
66 '../testing/gtest.gyp:gtest', 65 '../testing/gtest.gyp:gtest',
67 ], 66 ],
(...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after
134 'bpf_dsl/linux_syscall_ranges.h', 133 'bpf_dsl/linux_syscall_ranges.h',
135 'bpf_dsl/policy.cc', 134 'bpf_dsl/policy.cc',
136 'bpf_dsl/policy.h', 135 'bpf_dsl/policy.h',
137 'bpf_dsl/policy_compiler.cc', 136 'bpf_dsl/policy_compiler.cc',
138 'bpf_dsl/policy_compiler.h', 137 'bpf_dsl/policy_compiler.h',
139 'bpf_dsl/seccomp_macros.h', 138 'bpf_dsl/seccomp_macros.h',
140 'bpf_dsl/seccomp_macros.h', 139 'bpf_dsl/seccomp_macros.h',
141 'bpf_dsl/syscall_set.cc', 140 'bpf_dsl/syscall_set.cc',
142 'bpf_dsl/syscall_set.h', 141 'bpf_dsl/syscall_set.h',
143 'bpf_dsl/trap_registry.h', 142 'bpf_dsl/trap_registry.h',
143 'seccomp-bpf-helpers/baseline_policy.cc',
144 'seccomp-bpf-helpers/baseline_policy.h',
145 'seccomp-bpf-helpers/sigsys_handlers.cc',
146 'seccomp-bpf-helpers/sigsys_handlers.h',
147 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
148 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
149 'seccomp-bpf-helpers/syscall_sets.cc',
150 'seccomp-bpf-helpers/syscall_sets.h',
144 'seccomp-bpf/die.cc', 151 'seccomp-bpf/die.cc',
145 'seccomp-bpf/die.h', 152 'seccomp-bpf/die.h',
146 'seccomp-bpf/sandbox_bpf.cc', 153 'seccomp-bpf/sandbox_bpf.cc',
147 'seccomp-bpf/sandbox_bpf.h', 154 'seccomp-bpf/sandbox_bpf.h',
148 'seccomp-bpf/syscall.cc', 155 'seccomp-bpf/syscall.cc',
149 'seccomp-bpf/syscall.h', 156 'seccomp-bpf/syscall.h',
150 'seccomp-bpf/trap.cc', 157 'seccomp-bpf/trap.cc',
151 'seccomp-bpf/trap.h', 158 'seccomp-bpf/trap.h',
152 ], 159 ],
153 'dependencies': [ 160 'dependencies': [
154 '../base/base.gyp:base', 161 '../base/base.gyp:base',
155 'sandbox_services', 162 'sandbox_services',
156 'sandbox_services_headers', 163 'sandbox_services_headers',
157 ], 164 ],
158 'defines': [ 165 'defines': [
159 'SANDBOX_IMPLEMENTATION', 166 'SANDBOX_IMPLEMENTATION',
160 ], 167 ],
161 'includes': [ 168 'includes': [
162 # Disable LTO due to compiler bug 169 # Disable LTO due to compiler bug
163 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 170 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703
164 '../../build/android/disable_gcc_lto.gypi', 171 '../../build/android/disable_gcc_lto.gypi',
165 ], 172 ],
166 'include_dirs': [ 173 'include_dirs': [
167 '../..', 174 '../..',
168 ], 175 ],
169 }, 176 },
170 { 177 {
171 'target_name': 'seccomp_bpf_helpers',
172 'type': '<(component)',
173 'sources': [
174 'seccomp-bpf-helpers/baseline_policy.cc',
175 'seccomp-bpf-helpers/baseline_policy.h',
176 'seccomp-bpf-helpers/sigsys_handlers.cc',
177 'seccomp-bpf-helpers/sigsys_handlers.h',
178 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
179 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
180 'seccomp-bpf-helpers/syscall_sets.cc',
181 'seccomp-bpf-helpers/syscall_sets.h',
182 ],
183 'dependencies': [
184 '../base/base.gyp:base',
185 'sandbox_services',
186 'seccomp_bpf',
187 ],
188 'defines': [
189 'SANDBOX_IMPLEMENTATION',
190 ],
191 'include_dirs': [
192 '../..',
193 ],
194 },
195 {
196 # The setuid sandbox, for Linux 178 # The setuid sandbox, for Linux
197 'target_name': 'chrome_sandbox', 179 'target_name': 'chrome_sandbox',
198 'type': 'executable', 180 'type': 'executable',
199 'sources': [ 181 'sources': [
200 'suid/common/sandbox.h', 182 'suid/common/sandbox.h',
201 'suid/common/suid_unsafe_environment_variables.h', 183 'suid/common/suid_unsafe_environment_variables.h',
202 'suid/process_util.h', 184 'suid/process_util.h',
203 'suid/process_util_linux.c', 185 'suid/process_util_linux.c',
204 'suid/sandbox.c', 186 'suid/sandbox.c',
205 ], 187 ],
(...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after
425 '../../build/isolate.gypi', 407 '../../build/isolate.gypi',
426 ], 408 ],
427 'sources': [ 409 'sources': [
428 '../sandbox_linux_unittests.isolate', 410 '../sandbox_linux_unittests.isolate',
429 ], 411 ],
430 }, 412 },
431 ], 413 ],
432 }], 414 }],
433 ], 415 ],
434 } 416 }
OLDNEW
« no previous file with comments | « sandbox/linux/BUILD.gn ('k') | services/shell/runner/host/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698