Bug 1274826 - Bypass building SandboxHooks on Gonk r?jld
MozReview-Commit-ID: 3TVdcY7aXvW
--- a/security/sandbox/linux/moz.build
+++ b/security/sandbox/linux/moz.build
@@ -63,21 +63,25 @@ SOURCES += [
'../chromium/sandbox/linux/seccomp-bpf/trap.cc',
'broker/SandboxBrokerCommon.cpp',
'LinuxCapabilities.cpp',
'Sandbox.cpp',
'SandboxBrokerClient.cpp',
'SandboxChroot.cpp',
'SandboxFilter.cpp',
'SandboxFilterUtil.cpp',
- 'SandboxHooks.cpp',
'SandboxLogging.cpp',
'SandboxUtil.cpp',
]
+if CONFIG['MOZ_WIDGET_TOOLKIT'] != 'gonk':
+ SOURCES += [
+ 'SandboxHooks.cpp',
+ ]
+
# This copy of SafeSPrintf doesn't need to avoid the Chromium logging
# dependency like the one in libxul does, but this way the behavior is
# consistent. See also the comment in SandboxLogging.h.
SOURCES['../chromium/base/strings/safe_sprintf.cc'].flags += ['-DNDEBUG']
# Keep clang from warning about intentional 'switch' fallthrough in icu_utf.cc:
if CONFIG['CLANG_CXX']:
SOURCES['../chromium/base/third_party/icu/icu_utf.cc'].flags += ['-Wno-implicit-fallthrough']