Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(97)

Side by Side Diff: sandbox/linux/sandbox_linux.gypi

Issue 684993005: Linux sandbox: start adding syscall wrappers (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: More dependencies. Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 { 5 {
6 'variables': { 6 'variables': {
7 'conditions': [ 7 'conditions': [
8 ['OS=="linux"', { 8 ['OS=="linux"', {
9 'compile_suid_client': 1, 9 'compile_suid_client': 1,
10 'compile_credentials': 1, 10 'compile_credentials': 1,
(...skipping 135 matching lines...) Expand 10 before | Expand all | Expand 10 after
146 'seccomp-bpf/syscall.h', 146 'seccomp-bpf/syscall.h',
147 'seccomp-bpf/syscall_iterator.cc', 147 'seccomp-bpf/syscall_iterator.cc',
148 'seccomp-bpf/syscall_iterator.h', 148 'seccomp-bpf/syscall_iterator.h',
149 'seccomp-bpf/trap.cc', 149 'seccomp-bpf/trap.cc',
150 'seccomp-bpf/trap.h', 150 'seccomp-bpf/trap.h',
151 'seccomp-bpf/verifier.cc', 151 'seccomp-bpf/verifier.cc',
152 'seccomp-bpf/verifier.h', 152 'seccomp-bpf/verifier.h',
153 ], 153 ],
154 'dependencies': [ 154 'dependencies': [
155 '../base/base.gyp:base', 155 '../base/base.gyp:base',
156 'sandbox_services',
156 'sandbox_services_headers', 157 'sandbox_services_headers',
157 ], 158 ],
158 'defines': [ 159 'defines': [
159 'SANDBOX_IMPLEMENTATION', 160 'SANDBOX_IMPLEMENTATION',
160 ], 161 ],
161 'includes': [ 162 'includes': [
162 # Disable LTO due to compiler bug 163 # Disable LTO due to compiler bug
163 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 164 # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703
164 '../../build/android/disable_lto.gypi', 165 '../../build/android/disable_lto.gypi',
165 ], 166 ],
166 'include_dirs': [ 167 'include_dirs': [
167 '../..', 168 '../..',
168 ], 169 ],
169 }, 170 },
170 { 171 {
171 'target_name': 'seccomp_bpf_helpers', 172 'target_name': 'seccomp_bpf_helpers',
172 'type': '<(component)', 173 'type': '<(component)',
173 'sources': [ 174 'sources': [
174 'seccomp-bpf-helpers/baseline_policy.cc', 175 'seccomp-bpf-helpers/baseline_policy.cc',
175 'seccomp-bpf-helpers/baseline_policy.h', 176 'seccomp-bpf-helpers/baseline_policy.h',
176 'seccomp-bpf-helpers/sigsys_handlers.cc', 177 'seccomp-bpf-helpers/sigsys_handlers.cc',
177 'seccomp-bpf-helpers/sigsys_handlers.h', 178 'seccomp-bpf-helpers/sigsys_handlers.h',
178 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', 179 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
179 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', 180 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
180 'seccomp-bpf-helpers/syscall_sets.cc', 181 'seccomp-bpf-helpers/syscall_sets.cc',
181 'seccomp-bpf-helpers/syscall_sets.h', 182 'seccomp-bpf-helpers/syscall_sets.h',
182 ], 183 ],
183 'dependencies': [ 184 'dependencies': [
184 '../base/base.gyp:base', 185 '../base/base.gyp:base',
186 'sandbox_services',
185 'seccomp_bpf', 187 'seccomp_bpf',
186 ], 188 ],
187 'defines': [ 189 'defines': [
188 'SANDBOX_IMPLEMENTATION', 190 'SANDBOX_IMPLEMENTATION',
189 ], 191 ],
190 'include_dirs': [ 192 'include_dirs': [
191 '../..', 193 '../..',
192 ], 194 ],
193 }, 195 },
194 { 196 {
(...skipping 22 matching lines...) Expand all
217 ['exclude', '-fsanitize'], 219 ['exclude', '-fsanitize'],
218 ], 220 ],
219 }, 221 },
220 { 'target_name': 'sandbox_services', 222 { 'target_name': 'sandbox_services',
221 'type': '<(component)', 223 'type': '<(component)',
222 'sources': [ 224 'sources': [
223 'services/init_process_reaper.cc', 225 'services/init_process_reaper.cc',
224 'services/init_process_reaper.h', 226 'services/init_process_reaper.h',
225 'services/scoped_process.cc', 227 'services/scoped_process.cc',
226 'services/scoped_process.h', 228 'services/scoped_process.h',
229 'services/syscall_wrappers.cc',
230 'services/syscall_wrappers.h',
227 'services/thread_helpers.cc', 231 'services/thread_helpers.cc',
228 'services/thread_helpers.h', 232 'services/thread_helpers.h',
229 'services/yama.cc', 233 'services/yama.cc',
230 'services/yama.h', 234 'services/yama.h',
231 'syscall_broker/broker_client.cc', 235 'syscall_broker/broker_client.cc',
232 'syscall_broker/broker_client.h', 236 'syscall_broker/broker_client.h',
233 'syscall_broker/broker_common.h', 237 'syscall_broker/broker_common.h',
234 'syscall_broker/broker_host.cc', 238 'syscall_broker/broker_host.cc',
235 'syscall_broker/broker_host.h', 239 'syscall_broker/broker_host.h',
236 'syscall_broker/broker_policy.cc', 240 'syscall_broker/broker_policy.cc',
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after
377 '../../build/isolate.gypi', 381 '../../build/isolate.gypi',
378 ], 382 ],
379 'sources': [ 383 'sources': [
380 '../sandbox_linux_unittests.isolate', 384 '../sandbox_linux_unittests.isolate',
381 ], 385 ],
382 }, 386 },
383 ], 387 ],
384 }], 388 }],
385 ], 389 ],
386 } 390 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698