Bug 1274826 - Bypass building SandboxHooks on Gonk r?jld draft
authorAlexandre Lissy <lissyx@lissyx.dyndns.org>
Thu, 26 May 2016 01:02:25 +0200
changeset 371116 d6cf1ec309e7e49e44a69da33e64b0ae9b9d48ba
parent 369957 46fe2115d46a5bb40523b8466341d8f9a26e1bdf
child 521909 1bdd7b3627b0e070f811a8830a135ae7ffa6c057
push id19235
push userbmo:lissyx+mozillians@lissyx.dyndns.org
push dateWed, 25 May 2016 23:08:02 +0000
reviewersjld
bugs1274826
milestone49.0a1
Bug 1274826 - Bypass building SandboxHooks on Gonk r?jld MozReview-Commit-ID: 3TVdcY7aXvW
security/sandbox/linux/moz.build
--- a/security/sandbox/linux/moz.build
+++ b/security/sandbox/linux/moz.build
@@ -63,21 +63,25 @@ SOURCES += [
     '../chromium/sandbox/linux/seccomp-bpf/trap.cc',
     'broker/SandboxBrokerCommon.cpp',
     'LinuxCapabilities.cpp',
     'Sandbox.cpp',
     'SandboxBrokerClient.cpp',
     'SandboxChroot.cpp',
     'SandboxFilter.cpp',
     'SandboxFilterUtil.cpp',
-    'SandboxHooks.cpp',
     'SandboxLogging.cpp',
     'SandboxUtil.cpp',
 ]
 
+if CONFIG['MOZ_WIDGET_TOOLKIT'] != 'gonk':
+    SOURCES += [
+        'SandboxHooks.cpp',
+    ]
+
 # This copy of SafeSPrintf doesn't need to avoid the Chromium logging
 # dependency like the one in libxul does, but this way the behavior is
 # consistent.  See also the comment in SandboxLogging.h.
 SOURCES['../chromium/base/strings/safe_sprintf.cc'].flags += ['-DNDEBUG']
 
 # Keep clang from warning about intentional 'switch' fallthrough in icu_utf.cc:
 if CONFIG['CLANG_CXX']:
     SOURCES['../chromium/base/third_party/icu/icu_utf.cc'].flags += ['-Wno-implicit-fallthrough']