Line
Link Here
|
0 |
-- qtwebengine-opensource-src-5.9.4/src/3rdparty/chromium/sandbox/linux/BUILD.gn |
0 |
++ qtwebengine-opensource-src-5.9.4/src/3rdparty/chromium/sandbox/linux/BUILD.gn |
Lines 199-204
test("sandbox_linux_unittests") {
Link Here
|
199 |
} |
199 |
} |
200 |
} |
200 |
} |
201 |
|
201 |
|
|
|
202 |
config("no_lto") { |
203 |
# Disable LTO. Use a config and the C++ specific flags variable to move |
204 |
# the flag to the latest possible position to override earlier flags. |
205 |
cflags_cc = [ "-fno-lto" ] |
206 |
} |
207 |
|
208 |
source_set("seccomp_bpf_syscall") { |
209 |
sources = [ "seccomp-bpf/syscall.cc" ] |
210 |
defines = [ "SANDBOX_IMPLEMENTATION" ] |
211 |
deps = [ "//base" ] |
212 |
|
213 |
if (!is_clang) { |
214 |
# Gcc doesn't parse asm statements, so LTO doesn't work when defining |
215 |
# a function in a global asm statement. |
216 |
# https://gcc.gnu.org/bugzilla/show_bug.cgi?id=57703 |
217 |
configs += [ ":no_lto" ] |
218 |
} |
219 |
} |
220 |
|
202 |
component("seccomp_bpf") { |
221 |
component("seccomp_bpf") { |
203 |
sources = [ |
222 |
sources = [ |
204 |
"bpf_dsl/bpf_dsl.cc", |
223 |
"bpf_dsl/bpf_dsl.cc", |
Lines 230-236
component("seccomp_bpf") {
Link Here
|
230 |
"seccomp-bpf/die.h", |
249 |
"seccomp-bpf/die.h", |
231 |
"seccomp-bpf/sandbox_bpf.cc", |
250 |
"seccomp-bpf/sandbox_bpf.cc", |
232 |
"seccomp-bpf/sandbox_bpf.h", |
251 |
"seccomp-bpf/sandbox_bpf.h", |
233 |
"seccomp-bpf/syscall.cc", |
|
|
234 |
"seccomp-bpf/syscall.h", |
252 |
"seccomp-bpf/syscall.h", |
235 |
"seccomp-bpf/trap.cc", |
253 |
"seccomp-bpf/trap.cc", |
236 |
"seccomp-bpf/trap.h", |
254 |
"seccomp-bpf/trap.h", |
Lines 242-247
component("seccomp_bpf") {
Link Here
|
242 |
] |
260 |
] |
243 |
deps = [ |
261 |
deps = [ |
244 |
":sandbox_services", |
262 |
":sandbox_services", |
|
|
263 |
":seccomp_bpf_syscall", |
245 |
"//base", |
264 |
"//base", |
246 |
] |
265 |
] |
247 |
|
266 |
|