Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(103)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 888093005: sandbox: move Codegen into bpf_dsl directory (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | sandbox/linux/bpf_dsl/codegen.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 import("//testing/test.gni") 6 import("//testing/test.gni")
7 7
8 declare_args() { 8 declare_args() {
9 compile_suid_client = is_linux 9 compile_suid_client = is_linux
10 10
(...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after
93 libs = [ "rt" ] 93 libs = [ "rt" ]
94 } 94 }
95 95
96 if (compile_suid_client) { 96 if (compile_suid_client) {
97 sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ] 97 sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ]
98 } 98 }
99 if (use_seccomp_bpf) { 99 if (use_seccomp_bpf) {
100 sources += [ 100 sources += [
101 "bpf_dsl/bpf_dsl_more_unittest.cc", 101 "bpf_dsl/bpf_dsl_more_unittest.cc",
102 "bpf_dsl/bpf_dsl_unittest.cc", 102 "bpf_dsl/bpf_dsl_unittest.cc",
103 "bpf_dsl/codegen_unittest.cc",
103 "bpf_dsl/cons_unittest.cc", 104 "bpf_dsl/cons_unittest.cc",
104 "seccomp-bpf-helpers/baseline_policy_unittest.cc", 105 "seccomp-bpf-helpers/baseline_policy_unittest.cc",
105 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", 106 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
106 "seccomp-bpf/bpf_tests_unittest.cc", 107 "seccomp-bpf/bpf_tests_unittest.cc",
107 "seccomp-bpf/codegen_unittest.cc",
108 "seccomp-bpf/errorcode_unittest.cc", 108 "seccomp-bpf/errorcode_unittest.cc",
109 "seccomp-bpf/sandbox_bpf_unittest.cc", 109 "seccomp-bpf/sandbox_bpf_unittest.cc",
110 "seccomp-bpf/syscall_iterator_unittest.cc", 110 "seccomp-bpf/syscall_iterator_unittest.cc",
111 "seccomp-bpf/syscall_unittest.cc", 111 "seccomp-bpf/syscall_unittest.cc",
112 ] 112 ]
113 } 113 }
114 if (compile_credentials) { 114 if (compile_credentials) {
115 sources += [ 115 sources += [
116 "services/credentials_unittest.cc", 116 "services/credentials_unittest.cc",
117 "services/namespace_sandbox_unittest.cc", 117 "services/namespace_sandbox_unittest.cc",
(...skipping 21 matching lines...) Expand all
139 # }], 139 # }],
140 # ], 140 # ],
141 # }, 141 # },
142 142
143 component("seccomp_bpf") { 143 component("seccomp_bpf") {
144 sources = [ 144 sources = [
145 "bpf_dsl/bpf_dsl.cc", 145 "bpf_dsl/bpf_dsl.cc",
146 "bpf_dsl/bpf_dsl.h", 146 "bpf_dsl/bpf_dsl.h",
147 "bpf_dsl/bpf_dsl_forward.h", 147 "bpf_dsl/bpf_dsl_forward.h",
148 "bpf_dsl/bpf_dsl_impl.h", 148 "bpf_dsl/bpf_dsl_impl.h",
149 "bpf_dsl/codegen.cc",
150 "bpf_dsl/codegen.h",
149 "bpf_dsl/cons.h", 151 "bpf_dsl/cons.h",
150 "bpf_dsl/dump_bpf.cc", 152 "bpf_dsl/dump_bpf.cc",
151 "bpf_dsl/dump_bpf.h", 153 "bpf_dsl/dump_bpf.h",
152 "bpf_dsl/policy.cc", 154 "bpf_dsl/policy.cc",
153 "bpf_dsl/policy.h", 155 "bpf_dsl/policy.h",
154 "bpf_dsl/policy_compiler.cc", 156 "bpf_dsl/policy_compiler.cc",
155 "bpf_dsl/policy_compiler.h", 157 "bpf_dsl/policy_compiler.h",
156 "bpf_dsl/trap_registry.h", 158 "bpf_dsl/trap_registry.h",
157 "seccomp-bpf/codegen.cc",
158 "seccomp-bpf/codegen.h",
159 "seccomp-bpf/die.cc", 159 "seccomp-bpf/die.cc",
160 "seccomp-bpf/die.h", 160 "seccomp-bpf/die.h",
161 "seccomp-bpf/errorcode.cc", 161 "seccomp-bpf/errorcode.cc",
162 "seccomp-bpf/errorcode.h", 162 "seccomp-bpf/errorcode.h",
163 "seccomp-bpf/linux_seccomp.h", 163 "seccomp-bpf/linux_seccomp.h",
164 "seccomp-bpf/sandbox_bpf.cc", 164 "seccomp-bpf/sandbox_bpf.cc",
165 "seccomp-bpf/sandbox_bpf.h", 165 "seccomp-bpf/sandbox_bpf.h",
166 "seccomp-bpf/syscall.cc", 166 "seccomp-bpf/syscall.cc",
167 "seccomp-bpf/syscall.h", 167 "seccomp-bpf/syscall.h",
168 "seccomp-bpf/syscall_iterator.cc", 168 "seccomp-bpf/syscall_iterator.cc",
(...skipping 172 matching lines...) Expand 10 before | Expand all | Expand 10 after
341 # 'type': 'none', 341 # 'type': 'none',
342 # 'variables': { 342 # 'variables': {
343 # 'test_suite_name': 'sandbox_linux_jni_unittests', 343 # 'test_suite_name': 'sandbox_linux_jni_unittests',
344 # }, 344 # },
345 # 'dependencies': [ 345 # 'dependencies': [
346 # 'sandbox_linux_jni_unittests', 346 # 'sandbox_linux_jni_unittests',
347 # ], 347 # ],
348 # 'includes': [ '../../build/apk_test.gypi' ], 348 # 'includes': [ '../../build/apk_test.gypi' ],
349 # } 349 # }
350 } 350 }
OLDNEW
« no previous file with comments | « no previous file | sandbox/linux/bpf_dsl/codegen.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698