Index: sandbox/linux/BUILD.gn |
diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn |
index 96df5fd69b286adaa3d944a294828f42208c65ac..64940f1455a63a84a2ce9056be8fd423468cad13 100644 |
--- a/sandbox/linux/BUILD.gn |
+++ b/sandbox/linux/BUILD.gn |
@@ -94,20 +94,23 @@ test("sandbox_linux_unittests") { |
} |
if (compile_suid_client) { |
- sources += [ "suid/client/setuid_sandbox_client_unittest.cc" ] |
+ sources += [ |
+ "suid/client/setuid_sandbox_client_unittest.cc", |
+ "suid/client/setuid_sandbox_host_unittest.cc", |
+ ] |
} |
if (use_seccomp_bpf) { |
sources += [ |
"bpf_dsl/bpf_dsl_more_unittest.cc", |
"bpf_dsl/bpf_dsl_unittest.cc", |
+ "bpf_dsl/codegen_unittest.cc", |
"bpf_dsl/cons_unittest.cc", |
+ "bpf_dsl/syscall_set_unittest.cc", |
"seccomp-bpf-helpers/baseline_policy_unittest.cc", |
"seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", |
"seccomp-bpf/bpf_tests_unittest.cc", |
- "seccomp-bpf/codegen_unittest.cc", |
"seccomp-bpf/errorcode_unittest.cc", |
"seccomp-bpf/sandbox_bpf_unittest.cc", |
- "seccomp-bpf/syscall_iterator_unittest.cc", |
"seccomp-bpf/syscall_unittest.cc", |
] |
} |
@@ -146,6 +149,8 @@ component("seccomp_bpf") { |
"bpf_dsl/bpf_dsl.h", |
"bpf_dsl/bpf_dsl_forward.h", |
"bpf_dsl/bpf_dsl_impl.h", |
+ "bpf_dsl/codegen.cc", |
+ "bpf_dsl/codegen.h", |
"bpf_dsl/cons.h", |
"bpf_dsl/dump_bpf.cc", |
"bpf_dsl/dump_bpf.h", |
@@ -153,9 +158,9 @@ component("seccomp_bpf") { |
"bpf_dsl/policy.h", |
"bpf_dsl/policy_compiler.cc", |
"bpf_dsl/policy_compiler.h", |
+ "bpf_dsl/syscall_set.cc", |
+ "bpf_dsl/syscall_set.h", |
"bpf_dsl/trap_registry.h", |
- "seccomp-bpf/codegen.cc", |
- "seccomp-bpf/codegen.h", |
"seccomp-bpf/die.cc", |
"seccomp-bpf/die.h", |
"seccomp-bpf/errorcode.cc", |
@@ -165,8 +170,6 @@ component("seccomp_bpf") { |
"seccomp-bpf/sandbox_bpf.h", |
"seccomp-bpf/syscall.cc", |
"seccomp-bpf/syscall.h", |
- "seccomp-bpf/syscall_iterator.cc", |
- "seccomp-bpf/syscall_iterator.h", |
"seccomp-bpf/trap.cc", |
"seccomp-bpf/trap.h", |
"seccomp-bpf/verifier.cc", |
@@ -306,6 +309,8 @@ if (compile_suid_client) { |
"suid/common/suid_unsafe_environment_variables.h", |
"suid/client/setuid_sandbox_client.cc", |
"suid/client/setuid_sandbox_client.h", |
+ "suid/client/setuid_sandbox_host.cc", |
+ "suid/client/setuid_sandbox_host.h", |
] |
defines = [ "SANDBOX_IMPLEMENTATION" ] |