openbsd-ports/www/iridium/patches/patch-sandbox_linux_BUILD_gn
2018-05-04 07:14:57 +00:00

50 lines
1.4 KiB
Plaintext

$OpenBSD: patch-sandbox_linux_BUILD_gn,v 1.4 2018/05/04 07:14:58 robert Exp $
Index: sandbox/linux/BUILD.gn
--- sandbox/linux/BUILD.gn.orig
+++ sandbox/linux/BUILD.gn
@@ -12,12 +12,12 @@ if (is_android) {
}
declare_args() {
- compile_suid_client = is_linux
+ compile_suid_client = is_linux && !is_openbsd
- compile_credentials = is_linux
+ compile_credentials = is_linux && !is_openbsd
# On Android, use plain GTest.
- use_base_test_suite = is_linux
+ use_base_test_suite = is_linux && !is_openbsd
}
if (is_nacl_nonsfi) {
@@ -397,7 +397,7 @@ component("sandbox_services") {
public_deps += [ ":sandbox_services_headers" ]
}
- if (is_nacl_nonsfi) {
+ if (is_nacl_nonsfi || is_openbsd) {
cflags = [ "-fgnu-inline-asm" ]
sources -= [
@@ -405,6 +405,8 @@ component("sandbox_services") {
"services/init_process_reaper.h",
"services/scoped_process.cc",
"services/scoped_process.h",
+ "services/syscall_wrappers.cc",
+ "services/syscall_wrappers.h",
"services/yama.cc",
"services/yama.h",
"syscall_broker/broker_channel.cc",
@@ -421,6 +423,10 @@ component("sandbox_services") {
"syscall_broker/broker_permission_list.h",
"syscall_broker/broker_process.cc",
"syscall_broker/broker_process.h",
+ ]
+ sources += [
+ "services/libc_interceptor.cc",
+ "services/libc_interceptor.h",
]
} else if (!is_android) {
sources += [