Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(341)

Side by Side Diff: sandbox/linux/BUILD.gn

Issue 896093002: sandbox: move SyscallSet into bpf_dsl (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@sandbox-deps
Patch Set: Fix bad merge conflict Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Copyright 2014 The Chromium Authors. All rights reserved. 1 # Copyright 2014 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 import("//build/config/features.gni") 5 import("//build/config/features.gni")
6 import("//testing/test.gni") 6 import("//testing/test.gni")
7 7
8 declare_args() { 8 declare_args() {
9 compile_suid_client = is_linux 9 compile_suid_client = is_linux
10 10
(...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after
98 "suid/client/setuid_sandbox_client_unittest.cc", 98 "suid/client/setuid_sandbox_client_unittest.cc",
99 "suid/client/setuid_sandbox_host_unittest.cc", 99 "suid/client/setuid_sandbox_host_unittest.cc",
100 ] 100 ]
101 } 101 }
102 if (use_seccomp_bpf) { 102 if (use_seccomp_bpf) {
103 sources += [ 103 sources += [
104 "bpf_dsl/bpf_dsl_more_unittest.cc", 104 "bpf_dsl/bpf_dsl_more_unittest.cc",
105 "bpf_dsl/bpf_dsl_unittest.cc", 105 "bpf_dsl/bpf_dsl_unittest.cc",
106 "bpf_dsl/codegen_unittest.cc", 106 "bpf_dsl/codegen_unittest.cc",
107 "bpf_dsl/cons_unittest.cc", 107 "bpf_dsl/cons_unittest.cc",
108 "bpf_dsl/syscall_set_unittest.cc",
108 "seccomp-bpf-helpers/baseline_policy_unittest.cc", 109 "seccomp-bpf-helpers/baseline_policy_unittest.cc",
109 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", 110 "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
110 "seccomp-bpf/bpf_tests_unittest.cc", 111 "seccomp-bpf/bpf_tests_unittest.cc",
111 "seccomp-bpf/errorcode_unittest.cc", 112 "seccomp-bpf/errorcode_unittest.cc",
112 "seccomp-bpf/sandbox_bpf_unittest.cc", 113 "seccomp-bpf/sandbox_bpf_unittest.cc",
113 "seccomp-bpf/syscall_iterator_unittest.cc",
114 "seccomp-bpf/syscall_unittest.cc", 114 "seccomp-bpf/syscall_unittest.cc",
115 ] 115 ]
116 } 116 }
117 if (compile_credentials) { 117 if (compile_credentials) {
118 sources += [ 118 sources += [
119 "services/credentials_unittest.cc", 119 "services/credentials_unittest.cc",
120 "services/namespace_sandbox_unittest.cc", 120 "services/namespace_sandbox_unittest.cc",
121 "services/namespace_utils_unittest.cc", 121 "services/namespace_utils_unittest.cc",
122 "services/proc_util_unittest.cc", 122 "services/proc_util_unittest.cc",
123 "services/unix_domain_socket_unittest.cc", 123 "services/unix_domain_socket_unittest.cc",
(...skipping 27 matching lines...) Expand all
151 "bpf_dsl/bpf_dsl_impl.h", 151 "bpf_dsl/bpf_dsl_impl.h",
152 "bpf_dsl/codegen.cc", 152 "bpf_dsl/codegen.cc",
153 "bpf_dsl/codegen.h", 153 "bpf_dsl/codegen.h",
154 "bpf_dsl/cons.h", 154 "bpf_dsl/cons.h",
155 "bpf_dsl/dump_bpf.cc", 155 "bpf_dsl/dump_bpf.cc",
156 "bpf_dsl/dump_bpf.h", 156 "bpf_dsl/dump_bpf.h",
157 "bpf_dsl/policy.cc", 157 "bpf_dsl/policy.cc",
158 "bpf_dsl/policy.h", 158 "bpf_dsl/policy.h",
159 "bpf_dsl/policy_compiler.cc", 159 "bpf_dsl/policy_compiler.cc",
160 "bpf_dsl/policy_compiler.h", 160 "bpf_dsl/policy_compiler.h",
161 "bpf_dsl/syscall_set.cc",
162 "bpf_dsl/syscall_set.h",
161 "bpf_dsl/trap_registry.h", 163 "bpf_dsl/trap_registry.h",
162 "seccomp-bpf/die.cc", 164 "seccomp-bpf/die.cc",
163 "seccomp-bpf/die.h", 165 "seccomp-bpf/die.h",
164 "seccomp-bpf/errorcode.cc", 166 "seccomp-bpf/errorcode.cc",
165 "seccomp-bpf/errorcode.h", 167 "seccomp-bpf/errorcode.h",
166 "seccomp-bpf/linux_seccomp.h", 168 "seccomp-bpf/linux_seccomp.h",
167 "seccomp-bpf/sandbox_bpf.cc", 169 "seccomp-bpf/sandbox_bpf.cc",
168 "seccomp-bpf/sandbox_bpf.h", 170 "seccomp-bpf/sandbox_bpf.h",
169 "seccomp-bpf/syscall.cc", 171 "seccomp-bpf/syscall.cc",
170 "seccomp-bpf/syscall.h", 172 "seccomp-bpf/syscall.h",
171 "seccomp-bpf/syscall_iterator.cc",
172 "seccomp-bpf/syscall_iterator.h",
173 "seccomp-bpf/trap.cc", 173 "seccomp-bpf/trap.cc",
174 "seccomp-bpf/trap.h", 174 "seccomp-bpf/trap.h",
175 "seccomp-bpf/verifier.cc", 175 "seccomp-bpf/verifier.cc",
176 "seccomp-bpf/verifier.h", 176 "seccomp-bpf/verifier.h",
177 ] 177 ]
178 defines = [ "SANDBOX_IMPLEMENTATION" ] 178 defines = [ "SANDBOX_IMPLEMENTATION" ]
179 179
180 deps = [ 180 deps = [
181 ":sandbox_services", 181 ":sandbox_services",
182 ":sandbox_services_headers", 182 ":sandbox_services_headers",
(...skipping 163 matching lines...) Expand 10 before | Expand all | Expand 10 after
346 # 'type': 'none', 346 # 'type': 'none',
347 # 'variables': { 347 # 'variables': {
348 # 'test_suite_name': 'sandbox_linux_jni_unittests', 348 # 'test_suite_name': 'sandbox_linux_jni_unittests',
349 # }, 349 # },
350 # 'dependencies': [ 350 # 'dependencies': [
351 # 'sandbox_linux_jni_unittests', 351 # 'sandbox_linux_jni_unittests',
352 # ], 352 # ],
353 # 'includes': [ '../../build/apk_test.gypi' ], 353 # 'includes': [ '../../build/apk_test.gypi' ],
354 # } 354 # }
355 } 355 }
OLDNEW
« no previous file with comments | « no previous file | sandbox/linux/bpf_dsl/policy_compiler.cc » ('j') | sandbox/linux/bpf_dsl/syscall_set.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698