Index: sandbox/linux/BUILD.gn |
diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn |
index 64940f1455a63a84a2ce9056be8fd423468cad13..8b18a3a5f80ee0c06fab1354f5040e2b28994a5c 100644 |
--- a/sandbox/linux/BUILD.gn |
+++ b/sandbox/linux/BUILD.gn |
@@ -66,6 +66,8 @@ source_set("sandbox_linux_test_utils") { |
# The main sandboxing test target. |
test("sandbox_linux_unittests") { |
sources = [ |
+ "services/proc_util_unittest.cc", |
+ "services/resource_limits_unittests.cc", |
"services/scoped_process_unittest.cc", |
"services/syscall_wrappers_unittest.cc", |
"services/thread_helpers_unittests.cc", |
@@ -101,11 +103,12 @@ test("sandbox_linux_unittests") { |
} |
if (use_seccomp_bpf) { |
sources += [ |
- "bpf_dsl/bpf_dsl_more_unittest.cc", |
"bpf_dsl/bpf_dsl_unittest.cc", |
"bpf_dsl/codegen_unittest.cc", |
"bpf_dsl/cons_unittest.cc", |
"bpf_dsl/syscall_set_unittest.cc", |
+ "integration_tests/bpf_dsl_seccomp_unittest.cc", |
+ "integration_tests/seccomp_broker_process_unittest.cc", |
"seccomp-bpf-helpers/baseline_policy_unittest.cc", |
"seccomp-bpf-helpers/syscall_parameters_restrictions_unittests.cc", |
"seccomp-bpf/bpf_tests_unittest.cc", |
@@ -116,11 +119,10 @@ test("sandbox_linux_unittests") { |
} |
if (compile_credentials) { |
sources += [ |
+ "integration_tests/namespace_unix_domain_socket_unittest.cc", |
"services/credentials_unittest.cc", |
"services/namespace_sandbox_unittest.cc", |
"services/namespace_utils_unittest.cc", |
- "services/proc_util_unittest.cc", |
- "services/unix_domain_socket_unittest.cc", |
] |
} |
} |
@@ -154,10 +156,12 @@ component("seccomp_bpf") { |
"bpf_dsl/cons.h", |
"bpf_dsl/dump_bpf.cc", |
"bpf_dsl/dump_bpf.h", |
+ "bpf_dsl/linux_syscall_ranges.h", |
"bpf_dsl/policy.cc", |
"bpf_dsl/policy.h", |
"bpf_dsl/policy_compiler.cc", |
"bpf_dsl/policy_compiler.h", |
+ "bpf_dsl/seccomp_macros.h", |
"bpf_dsl/syscall_set.cc", |
"bpf_dsl/syscall_set.h", |
"bpf_dsl/trap_registry.h", |
@@ -165,7 +169,6 @@ component("seccomp_bpf") { |
"seccomp-bpf/die.h", |
"seccomp-bpf/errorcode.cc", |
"seccomp-bpf/errorcode.h", |
- "seccomp-bpf/linux_seccomp.h", |
"seccomp-bpf/sandbox_bpf.cc", |
"seccomp-bpf/sandbox_bpf.h", |
"seccomp-bpf/syscall.cc", |
@@ -230,14 +233,18 @@ component("sandbox_services") { |
sources = [ |
"services/init_process_reaper.cc", |
"services/init_process_reaper.h", |
+ "services/proc_util.cc", |
+ "services/proc_util.h", |
+ "services/resource_limits.cc", |
+ "services/resource_limits.h", |
"services/scoped_process.cc", |
"services/scoped_process.h", |
"services/syscall_wrappers.cc", |
"services/syscall_wrappers.h", |
"services/thread_helpers.cc", |
"services/thread_helpers.h", |
- "services/yama.h", |
"services/yama.cc", |
+ "services/yama.h", |
"syscall_broker/broker_channel.cc", |
"syscall_broker/broker_channel.h", |
"syscall_broker/broker_client.cc", |
@@ -263,8 +270,6 @@ component("sandbox_services") { |
"services/namespace_sandbox.h", |
"services/namespace_utils.cc", |
"services/namespace_utils.h", |
- "services/proc_util.cc", |
- "services/proc_util.h", |
] |
# For capabilities.cc. |
@@ -278,16 +283,17 @@ component("sandbox_services") { |
source_set("sandbox_services_headers") { |
sources = [ |
- "services/android_arm_ucontext.h", |
- "services/android_arm64_ucontext.h", |
- "services/android_futex.h", |
- "services/android_ucontext.h", |
- "services/android_i386_ucontext.h", |
- "services/arm_linux_syscalls.h", |
- "services/arm64_linux_syscalls.h", |
- "services/linux_syscalls.h", |
- "services/x86_32_linux_syscalls.h", |
- "services/x86_64_linux_syscalls.h", |
+ "system_headers/android_arm64_ucontext.h", |
+ "system_headers/android_arm_ucontext.h", |
+ "system_headers/android_futex.h", |
+ "system_headers/android_i386_ucontext.h", |
+ "system_headers/android_ucontext.h", |
+ "system_headers/arm64_linux_syscalls.h", |
+ "system_headers/arm_linux_syscalls.h", |
+ "system_headers/linux_seccomp.h", |
+ "system_headers/linux_syscalls.h", |
+ "system_headers/x86_32_linux_syscalls.h", |
+ "system_headers/x86_64_linux_syscalls.h", |
] |
} |