Index: sandbox/linux/sandbox_linux.gypi |
diff --git a/sandbox/linux/sandbox_linux.gypi b/sandbox/linux/sandbox_linux.gypi |
new file mode 100644 |
index 0000000000000000000000000000000000000000..20dac8f1fc733175a5945f6a968ea721e3d094cf |
--- /dev/null |
+++ b/sandbox/linux/sandbox_linux.gypi |
@@ -0,0 +1,357 @@ |
+# Copyright (c) 2012 The Chromium Authors. All rights reserved. |
+# Use of this source code is governed by a BSD-style license that can be |
+# found in the LICENSE file. |
+ |
+{ |
+ 'variables': { |
+ 'conditions': [ |
+ ['OS=="linux"', { |
+ 'compile_suid_client': 1, |
+ 'compile_credentials': 1, |
+ }, { |
+ 'compile_suid_client': 0, |
+ 'compile_credentials': 0, |
+ }], |
+ ['OS=="linux" and (target_arch=="ia32" or target_arch=="x64" or ' |
+ 'target_arch=="mipsel")', { |
+ 'compile_seccomp_bpf_demo': 1, |
+ }, { |
+ 'compile_seccomp_bpf_demo': 0, |
+ }], |
+ ], |
+ }, |
+ 'target_defaults': { |
+ 'target_conditions': [ |
+ # All linux/ files will automatically be excluded on Android |
+ # so make sure we re-include them explicitly. |
+ ['OS == "android"', { |
+ 'sources/': [ |
+ ['include', '^linux/'], |
+ ], |
+ }], |
+ ], |
+ }, |
+ 'targets': [ |
+ # We have two principal targets: sandbox and sandbox_linux_unittests |
+ # All other targets are listed as dependencies. |
+ # There is one notable exception: for historical reasons, chrome_sandbox is |
+ # the setuid sandbox and is its own target. |
+ { |
+ 'target_name': 'sandbox', |
+ 'type': 'none', |
+ 'dependencies': [ |
+ 'sandbox_services', |
+ ], |
+ 'conditions': [ |
+ [ 'compile_suid_client==1', { |
+ 'dependencies': [ |
+ 'suid_sandbox_client', |
+ ], |
+ }], |
+ # Compile seccomp BPF when we support it. |
+ [ 'use_seccomp_bpf==1', { |
+ 'dependencies': [ |
+ 'seccomp_bpf', |
+ 'seccomp_bpf_helpers', |
+ ], |
+ }], |
+ ], |
+ }, |
+ { |
+ 'target_name': 'sandbox_linux_test_utils', |
+ 'type': 'static_library', |
+ 'dependencies': [ |
+ '../testing/gtest.gyp:gtest', |
+ ], |
+ 'include_dirs': [ |
+ '../..', |
+ ], |
+ 'sources': [ |
+ 'tests/sandbox_test_runner.cc', |
+ 'tests/sandbox_test_runner.h', |
+ 'tests/sandbox_test_runner_function_pointer.cc', |
+ 'tests/sandbox_test_runner_function_pointer.h', |
+ 'tests/test_utils.cc', |
+ 'tests/test_utils.h', |
+ 'tests/unit_tests.cc', |
+ 'tests/unit_tests.h', |
+ ], |
+ 'conditions': [ |
+ [ 'use_seccomp_bpf==1', { |
+ 'sources': [ |
+ 'seccomp-bpf/bpf_tester_compatibility_delegate.h', |
+ 'seccomp-bpf/bpf_tests.h', |
+ 'seccomp-bpf/sandbox_bpf_test_runner.cc', |
+ 'seccomp-bpf/sandbox_bpf_test_runner.h', |
+ ], |
+ 'dependencies': [ |
+ 'seccomp_bpf', |
+ ] |
+ }], |
+ ], |
+ }, |
+ { |
+ # The main sandboxing test target. |
+ 'target_name': 'sandbox_linux_unittests', |
+ 'includes': [ |
+ 'sandbox_linux_test_sources.gypi', |
+ ], |
+ 'type': 'executable', |
+ }, |
+ { |
+ # This target is the shared library used by Android APK (i.e. |
+ # JNI-friendly) tests. |
+ 'target_name': 'sandbox_linux_jni_unittests', |
+ 'includes': [ |
+ 'sandbox_linux_test_sources.gypi', |
+ ], |
+ 'type': 'shared_library', |
+ 'conditions': [ |
+ [ 'OS == "android"', { |
+ 'dependencies': [ |
+ '../testing/android/native_test.gyp:native_test_native_code', |
+ ], |
+ }], |
+ ], |
+ }, |
+ { |
+ 'target_name': 'seccomp_bpf', |
+ 'type': '<(component)', |
+ 'sources': [ |
+ 'bpf_dsl/bpf_dsl.cc', |
+ 'bpf_dsl/bpf_dsl.h', |
+ 'bpf_dsl/bpf_dsl_impl.h', |
+ 'bpf_dsl/cons.h', |
+ 'bpf_dsl/policy_compiler.cc', |
+ 'bpf_dsl/policy_compiler.h', |
+ 'bpf_dsl/trap_registry.h', |
+ 'seccomp-bpf/basicblock.cc', |
+ 'seccomp-bpf/basicblock.h', |
+ 'seccomp-bpf/codegen.cc', |
+ 'seccomp-bpf/codegen.h', |
+ 'seccomp-bpf/die.cc', |
+ 'seccomp-bpf/die.h', |
+ 'seccomp-bpf/errorcode.cc', |
+ 'seccomp-bpf/errorcode.h', |
+ 'seccomp-bpf/instruction.h', |
+ 'seccomp-bpf/linux_seccomp.h', |
+ 'seccomp-bpf/sandbox_bpf.cc', |
+ 'seccomp-bpf/sandbox_bpf.h', |
+ 'seccomp-bpf/syscall.cc', |
+ 'seccomp-bpf/syscall.h', |
+ 'seccomp-bpf/syscall_iterator.cc', |
+ 'seccomp-bpf/syscall_iterator.h', |
+ 'seccomp-bpf/trap.cc', |
+ 'seccomp-bpf/trap.h', |
+ 'seccomp-bpf/verifier.cc', |
+ 'seccomp-bpf/verifier.h', |
+ ], |
+ 'dependencies': [ |
+ '../base/base.gyp:base', |
+ 'sandbox_services_headers', |
+ ], |
+ 'defines': [ |
+ 'SANDBOX_IMPLEMENTATION', |
+ ], |
+ 'includes': [ |
+ # Disable LTO due to compiler bug |
+ # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 |
+ '../../build/android/disable_lto.gypi', |
+ ], |
+ 'include_dirs': [ |
+ '../..', |
+ ], |
+ }, |
+ { |
+ 'target_name': 'seccomp_bpf_helpers', |
+ 'type': '<(component)', |
+ 'sources': [ |
+ 'seccomp-bpf-helpers/baseline_policy.cc', |
+ 'seccomp-bpf-helpers/baseline_policy.h', |
+ 'seccomp-bpf-helpers/sigsys_handlers.cc', |
+ 'seccomp-bpf-helpers/sigsys_handlers.h', |
+ 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', |
+ 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', |
+ 'seccomp-bpf-helpers/syscall_sets.cc', |
+ 'seccomp-bpf-helpers/syscall_sets.h', |
+ ], |
+ 'dependencies': [ |
+ '../base/base.gyp:base', |
+ 'seccomp_bpf', |
+ ], |
+ 'defines': [ |
+ 'SANDBOX_IMPLEMENTATION', |
+ ], |
+ 'include_dirs': [ |
+ '../..', |
+ ], |
+ }, |
+ { |
+ # The setuid sandbox, for Linux |
+ 'target_name': 'chrome_sandbox', |
+ 'type': 'executable', |
+ 'sources': [ |
+ 'suid/common/sandbox.h', |
+ 'suid/common/suid_unsafe_environment_variables.h', |
+ 'suid/process_util.h', |
+ 'suid/process_util_linux.c', |
+ 'suid/sandbox.c', |
+ ], |
+ 'cflags': [ |
+ # For ULLONG_MAX |
+ '-std=gnu99', |
+ ], |
+ 'include_dirs': [ |
+ '../..', |
+ ], |
+ # Do not use any sanitizer tools with this binary. http://crbug.com/382766 |
+ 'cflags/': [ |
+ ['exclude', '-fsanitize'], |
+ ], |
+ 'ldflags/': [ |
+ ['exclude', '-fsanitize'], |
+ ], |
+ }, |
+ { 'target_name': 'sandbox_services', |
+ 'type': '<(component)', |
+ 'sources': [ |
+ 'services/broker_process.cc', |
+ 'services/broker_process.h', |
+ 'services/init_process_reaper.cc', |
+ 'services/init_process_reaper.h', |
+ 'services/scoped_process.cc', |
+ 'services/scoped_process.h', |
+ 'services/thread_helpers.cc', |
+ 'services/thread_helpers.h', |
+ 'services/yama.h', |
+ 'services/yama.cc', |
+ ], |
+ 'dependencies': [ |
+ '../base/base.gyp:base', |
+ ], |
+ 'defines': [ |
+ 'SANDBOX_IMPLEMENTATION', |
+ ], |
+ 'conditions': [ |
+ ['compile_credentials==1', { |
+ 'sources': [ |
+ 'services/credentials.cc', |
+ 'services/credentials.h', |
+ ], |
+ 'dependencies': [ |
+ # for capabilities.cc. |
+ '../build/linux/system.gyp:libcap', |
+ ], |
+ }], |
+ ], |
+ 'include_dirs': [ |
+ '..', |
+ ], |
+ }, |
+ { 'target_name': 'sandbox_services_headers', |
+ 'type': 'none', |
+ 'sources': [ |
+ 'services/android_arm_ucontext.h', |
+ 'services/android_arm64_ucontext.h', |
+ 'services/android_futex.h', |
+ 'services/android_ucontext.h', |
+ 'services/android_i386_ucontext.h', |
+ 'services/android_mips_ucontext.h', |
+ 'services/arm_linux_syscalls.h', |
+ 'services/arm64_linux_syscalls.h', |
+ 'services/mips_linux_syscalls.h', |
+ 'services/linux_syscalls.h', |
+ 'services/x86_32_linux_syscalls.h', |
+ 'services/x86_64_linux_syscalls.h', |
+ ], |
+ 'include_dirs': [ |
+ '..', |
+ ], |
+ }, |
+ { |
+ # We make this its own target so that it does not interfere |
+ # with our tests. |
+ 'target_name': 'libc_urandom_override', |
+ 'type': 'static_library', |
+ 'sources': [ |
+ 'services/libc_urandom_override.cc', |
+ 'services/libc_urandom_override.h', |
+ ], |
+ 'dependencies': [ |
+ '../base/base.gyp:base', |
+ ], |
+ 'include_dirs': [ |
+ '..', |
+ ], |
+ }, |
+ { |
+ 'target_name': 'suid_sandbox_client', |
+ 'type': '<(component)', |
+ 'sources': [ |
+ 'suid/common/sandbox.h', |
+ 'suid/common/suid_unsafe_environment_variables.h', |
+ 'suid/client/setuid_sandbox_client.cc', |
+ 'suid/client/setuid_sandbox_client.h', |
+ ], |
+ 'defines': [ |
+ 'SANDBOX_IMPLEMENTATION', |
+ ], |
+ 'dependencies': [ |
+ '../base/base.gyp:base', |
+ 'sandbox_services', |
+ ], |
+ 'include_dirs': [ |
+ '..', |
+ ], |
+ }, |
+ ], |
+ 'conditions': [ |
+ [ 'OS=="android"', { |
+ 'targets': [ |
+ { |
+ 'target_name': 'sandbox_linux_unittests_stripped', |
+ 'type': 'none', |
+ 'dependencies': [ 'sandbox_linux_unittests' ], |
+ 'actions': [{ |
+ 'action_name': 'strip sandbox_linux_unittests', |
+ 'inputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests' ], |
+ 'outputs': [ '<(PRODUCT_DIR)/sandbox_linux_unittests_stripped' ], |
+ 'action': [ '<(android_strip)', '<@(_inputs)', '-o', '<@(_outputs)' ], |
+ }], |
+ } |
+ ], |
+ }], |
+ [ 'OS=="android"', { |
+ 'targets': [ |
+ { |
+ 'target_name': 'sandbox_linux_jni_unittests_apk', |
+ 'type': 'none', |
+ 'variables': { |
+ 'test_suite_name': 'sandbox_linux_jni_unittests', |
+ }, |
+ 'dependencies': [ |
+ 'sandbox_linux_jni_unittests', |
+ ], |
+ 'includes': [ '../../build/apk_test.gypi' ], |
+ } |
+ ], |
+ }], |
+ ['test_isolation_mode != "noop"', { |
+ 'targets': [ |
+ { |
+ 'target_name': 'sandbox_linux_unittests_run', |
+ 'type': 'none', |
+ 'dependencies': [ |
+ 'sandbox_linux_unittests', |
+ ], |
+ 'includes': [ |
+ '../../build/isolate.gypi', |
+ ], |
+ 'sources': [ |
+ '../sandbox_linux_unittests.isolate', |
+ ], |
+ }, |
+ ], |
+ }], |
+ ], |
+} |