Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(525)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 843583006: GN: Add -Wl,-z defs on linux and fix errors (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 6
7 declare_args() { 7 declare_args() {
8 compile_suid_client = is_linux 8 compile_suid_client = is_linux
9 9
10 compile_credentials = is_linux 10 compile_credentials = is_linux
(...skipping 175 matching lines...) Expand 10 before | Expand all | Expand 10 after
186 "seccomp-bpf-helpers/sigsys_handlers.h", 186 "seccomp-bpf-helpers/sigsys_handlers.h",
187 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc", 187 "seccomp-bpf-helpers/syscall_parameters_restrictions.cc",
188 "seccomp-bpf-helpers/syscall_parameters_restrictions.h", 188 "seccomp-bpf-helpers/syscall_parameters_restrictions.h",
189 "seccomp-bpf-helpers/syscall_sets.cc", 189 "seccomp-bpf-helpers/syscall_sets.cc",
190 "seccomp-bpf-helpers/syscall_sets.h", 190 "seccomp-bpf-helpers/syscall_sets.h",
191 ] 191 ]
192 defines = [ "SANDBOX_IMPLEMENTATION" ] 192 defines = [ "SANDBOX_IMPLEMENTATION" ]
193 193
194 deps = [ 194 deps = [
195 "//base", 195 "//base",
196 ":sandbox_services",
196 ":seccomp_bpf", 197 ":seccomp_bpf",
197 ] 198 ]
198 } 199 }
199 200
200 if (is_linux) { 201 if (is_linux) {
201 # The setuid sandbox for Linux. 202 # The setuid sandbox for Linux.
202 executable("chrome_sandbox") { 203 executable("chrome_sandbox") {
203 sources = [ 204 sources = [
204 "suid/common/sandbox.h", 205 "suid/common/sandbox.h",
205 "suid/common/suid_unsafe_environment_variables.h", 206 "suid/common/suid_unsafe_environment_variables.h",
(...skipping 127 matching lines...) Expand 10 before | Expand all | Expand 10 after
333 # 'type': 'none', 334 # 'type': 'none',
334 # 'variables': { 335 # 'variables': {
335 # 'test_suite_name': 'sandbox_linux_jni_unittests', 336 # 'test_suite_name': 'sandbox_linux_jni_unittests',
336 # }, 337 # },
337 # 'dependencies': [ 338 # 'dependencies': [
338 # 'sandbox_linux_jni_unittests', 339 # 'sandbox_linux_jni_unittests',
339 # ], 340 # ],
340 # 'includes': [ '../../build/apk_test.gypi' ], 341 # 'includes': [ '../../build/apk_test.gypi' ],
341 # } 342 # }
342 } 343 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698