| Index: sandbox/linux/BUILD.gn
|
| diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn
|
| index 64940f1455a63a84a2ce9056be8fd423468cad13..8b18a3a5f80ee0c06fab1354f5040e2b28994a5c 100644
|
| --- a/sandbox/linux/BUILD.gn
|
| +++ b/sandbox/linux/BUILD.gn
|
| @@ -66,6 +66,8 @@ source_set("sandbox_linux_test_utils") {
|
| # The main sandboxing test target.
|
| test("sandbox_linux_unittests") {
|
| sources = [
|
| + "services/proc_util_unittest.cc",
|
| + "services/resource_limits_unittests.cc",
|
| "services/scoped_process_unittest.cc",
|
| "services/syscall_wrappers_unittest.cc",
|
| "services/thread_helpers_unittests.cc",
|
| @@ -101,11 +103,12 @@ test("sandbox_linux_unittests") {
|
| }
|
| if (use_seccomp_bpf) {
|
| sources += [
|
| - "bpf_dsl/bpf_dsl_more_unittest.cc",
|
| "bpf_dsl/bpf_dsl_unittest.cc",
|
| "bpf_dsl/codegen_unittest.cc",
|
| "bpf_dsl/cons_unittest.cc",
|
| "bpf_dsl/syscall_set_unittest.cc",
|
| + "integration_tests/bpf_dsl_seccomp_unittest.cc",
|
| + "integration_tests/seccomp_broker_process_unittest.cc",
|
| "seccomp-bpf-helpers/baseline_policy_unittest.cc",
|
| "seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc",
|
| "seccomp-bpf/bpf_tests_unittest.cc",
|
| @@ -116,11 +119,10 @@ test("sandbox_linux_unittests") {
|
| }
|
| if (compile_credentials) {
|
| sources += [
|
| + "integration_tests/namespace_unix_domain_socket_unittest.cc",
|
| "services/credentials_unittest.cc",
|
| "services/namespace_sandbox_unittest.cc",
|
| "services/namespace_utils_unittest.cc",
|
| - "services/proc_util_unittest.cc",
|
| - "services/unix_domain_socket_unittest.cc",
|
| ]
|
| }
|
| }
|
| @@ -154,10 +156,12 @@ component("seccomp_bpf") {
|
| "bpf_dsl/cons.h",
|
| "bpf_dsl/dump_bpf.cc",
|
| "bpf_dsl/dump_bpf.h",
|
| + "bpf_dsl/linux_syscall_ranges.h",
|
| "bpf_dsl/policy.cc",
|
| "bpf_dsl/policy.h",
|
| "bpf_dsl/policy_compiler.cc",
|
| "bpf_dsl/policy_compiler.h",
|
| + "bpf_dsl/seccomp_macros.h",
|
| "bpf_dsl/syscall_set.cc",
|
| "bpf_dsl/syscall_set.h",
|
| "bpf_dsl/trap_registry.h",
|
| @@ -165,7 +169,6 @@ component("seccomp_bpf") {
|
| "seccomp-bpf/die.h",
|
| "seccomp-bpf/errorcode.cc",
|
| "seccomp-bpf/errorcode.h",
|
| - "seccomp-bpf/linux_seccomp.h",
|
| "seccomp-bpf/sandbox_bpf.cc",
|
| "seccomp-bpf/sandbox_bpf.h",
|
| "seccomp-bpf/syscall.cc",
|
| @@ -230,14 +233,18 @@ component("sandbox_services") {
|
| sources = [
|
| "services/init_process_reaper.cc",
|
| "services/init_process_reaper.h",
|
| + "services/proc_util.cc",
|
| + "services/proc_util.h",
|
| + "services/resource_limits.cc",
|
| + "services/resource_limits.h",
|
| "services/scoped_process.cc",
|
| "services/scoped_process.h",
|
| "services/syscall_wrappers.cc",
|
| "services/syscall_wrappers.h",
|
| "services/thread_helpers.cc",
|
| "services/thread_helpers.h",
|
| - "services/yama.h",
|
| "services/yama.cc",
|
| + "services/yama.h",
|
| "syscall_broker/broker_channel.cc",
|
| "syscall_broker/broker_channel.h",
|
| "syscall_broker/broker_client.cc",
|
| @@ -263,8 +270,6 @@ component("sandbox_services") {
|
| "services/namespace_sandbox.h",
|
| "services/namespace_utils.cc",
|
| "services/namespace_utils.h",
|
| - "services/proc_util.cc",
|
| - "services/proc_util.h",
|
| ]
|
|
|
| # For capabilities.cc.
|
| @@ -278,16 +283,17 @@ component("sandbox_services") {
|
|
|
| source_set("sandbox_services_headers") {
|
| sources = [
|
| - "services/android_arm_ucontext.h",
|
| - "services/android_arm64_ucontext.h",
|
| - "services/android_futex.h",
|
| - "services/android_ucontext.h",
|
| - "services/android_i386_ucontext.h",
|
| - "services/arm_linux_syscalls.h",
|
| - "services/arm64_linux_syscalls.h",
|
| - "services/linux_syscalls.h",
|
| - "services/x86_32_linux_syscalls.h",
|
| - "services/x86_64_linux_syscalls.h",
|
| + "system_headers/android_arm64_ucontext.h",
|
| + "system_headers/android_arm_ucontext.h",
|
| + "system_headers/android_futex.h",
|
| + "system_headers/android_i386_ucontext.h",
|
| + "system_headers/android_ucontext.h",
|
| + "system_headers/arm64_linux_syscalls.h",
|
| + "system_headers/arm_linux_syscalls.h",
|
| + "system_headers/linux_seccomp.h",
|
| + "system_headers/linux_syscalls.h",
|
| + "system_headers/x86_32_linux_syscalls.h",
|
| + "system_headers/x86_64_linux_syscalls.h",
|
| ]
|
| }
|
|
|
|
|