| Index: sandbox/linux/BUILD.gn
|
| diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn
|
| index 96df5fd69b286adaa3d944a294828f42208c65ac..64940f1455a63a84a2ce9056be8fd423468cad13 100644
|
| --- a/sandbox/linux/BUILD.gn
|
| +++ b/sandbox/linux/BUILD.gn
|
| @@ -94,20 +94,23 @@ test("sandbox_linux_unittests") {
|
| }
|
|
|
| if (compile_suid_client) {
|
| - sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ]
|
| + sources += [
|
| + "suid/client/setuid_sandbox_client_unittest.cc",
|
| + "suid/client/setuid_sandbox_host_unittest.cc",
|
| + ]
|
| }
|
| if (use_seccomp_bpf) {
|
| sources += [
|
| "bpf_dsl/bpf_dsl_more_unittest.cc",
|
| "bpf_dsl/bpf_dsl_unittest.cc",
|
| + "bpf_dsl/codegen_unittest.cc",
|
| "bpf_dsl/cons_unittest.cc",
|
| + "bpf_dsl/syscall_set_unittest.cc",
|
| "seccomp-bpf-helpers/baseline_policy_unittest.cc",
|
| "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
|
| "seccomp-bpf/bpf_tests_unittest.cc",
|
| - "seccomp-bpf/codegen_unittest.cc",
|
| "seccomp-bpf/errorcode_unittest.cc",
|
| "seccomp-bpf/sandbox_bpf_unittest.cc",
|
| - "seccomp-bpf/syscall_iterator_unittest.cc",
|
| "seccomp-bpf/syscall_unittest.cc",
|
| ]
|
| }
|
| @@ -146,6 +149,8 @@ component("seccomp_bpf") {
|
| "bpf_dsl/bpf_dsl.h",
|
| "bpf_dsl/bpf_dsl_forward.h",
|
| "bpf_dsl/bpf_dsl_impl.h",
|
| + "bpf_dsl/codegen.cc",
|
| + "bpf_dsl/codegen.h",
|
| "bpf_dsl/cons.h",
|
| "bpf_dsl/dump_bpf.cc",
|
| "bpf_dsl/dump_bpf.h",
|
| @@ -153,9 +158,9 @@ component("seccomp_bpf") {
|
| "bpf_dsl/policy.h",
|
| "bpf_dsl/policy_compiler.cc",
|
| "bpf_dsl/policy_compiler.h",
|
| + "bpf_dsl/syscall_set.cc",
|
| + "bpf_dsl/syscall_set.h",
|
| "bpf_dsl/trap_registry.h",
|
| - "seccomp-bpf/codegen.cc",
|
| - "seccomp-bpf/codegen.h",
|
| "seccomp-bpf/die.cc",
|
| "seccomp-bpf/die.h",
|
| "seccomp-bpf/errorcode.cc",
|
| @@ -165,8 +170,6 @@ component("seccomp_bpf") {
|
| "seccomp-bpf/sandbox_bpf.h",
|
| "seccomp-bpf/syscall.cc",
|
| "seccomp-bpf/syscall.h",
|
| - "seccomp-bpf/syscall_iterator.cc",
|
| - "seccomp-bpf/syscall_iterator.h",
|
| "seccomp-bpf/trap.cc",
|
| "seccomp-bpf/trap.h",
|
| "seccomp-bpf/verifier.cc",
|
| @@ -306,6 +309,8 @@ if (compile_suid_client) {
|
| "suid/common/suid_unsafe_environment_variables.h",
|
| "suid/client/setuid_sandbox_client.cc",
|
| "suid/client/setuid_sandbox_client.h",
|
| + "suid/client/setuid_sandbox_host.cc",
|
| + "suid/client/setuid_sandbox_host.h",
|
| ]
|
| defines = [ "SANDBOX_IMPLEMENTATION" ]
|
|
|
|
|