diff options
author | Torne (Richard Coles) <torne@google.com> | 2013-05-29 14:40:03 +0100 |
---|---|---|
committer | Torne (Richard Coles) <torne@google.com> | 2013-05-29 14:40:03 +0100 |
commit | 90dce4d38c5ff5333bea97d859d4e484e27edf0c (patch) | |
tree | 9c51c7dd97d24b15befa97a3482c51851e5383a1 /sandbox | |
parent | 1515035f5917d10d363b0888a3615d581ad8b83f (diff) | |
download | chromium_org-90dce4d38c5ff5333bea97d859d4e484e27edf0c.tar.gz |
Merge from Chromium at DEPS revision r202854
This commit was generated by merge_to_master.py.
Change-Id: Idca323f71ef844a9e04f454d4f070b1e398f2deb
Diffstat (limited to 'sandbox')
-rw-r--r-- | sandbox/linux/selinux/README | 12 | ||||
-rw-r--r-- | sandbox/linux/selinux/chromium-browser.if | 1 | ||||
-rw-r--r-- | sandbox/linux/selinux/chromium-browser.te | 40 | ||||
-rw-r--r-- | sandbox/linux/services/libc_urandom_override.cc | 6 | ||||
-rw-r--r-- | sandbox/linux/services/libc_urandom_override.h | 4 | ||||
-rw-r--r-- | sandbox/sandbox_services.target.darwin-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services.target.darwin-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services.target.linux-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services.target.linux-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services_headers.target.darwin-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services_headers.target.darwin-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services_headers.target.linux-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/sandbox_services_headers.target.linux-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/seccomp_bpf.target.darwin-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/seccomp_bpf.target.darwin-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/seccomp_bpf.target.linux-arm.mk | 7 | ||||
-rw-r--r-- | sandbox/seccomp_bpf.target.linux-x86.mk | 7 | ||||
-rw-r--r-- | sandbox/win/src/policy_params.h | 6 |
18 files changed, 52 insertions, 101 deletions
diff --git a/sandbox/linux/selinux/README b/sandbox/linux/selinux/README deleted file mode 100644 index f5428a3c75..0000000000 --- a/sandbox/linux/selinux/README +++ /dev/null @@ -1,12 +0,0 @@ -This contains a basic and seemingly functional policy for Chromium. This policy -was written on FC12 and might not function on other distributions depending on -the version of the refpolicy installed. - -When building Chromium with the GYP define selinux=1, the seccomp sandbox is -disabled and the zygote will perform a dynamic transition to chromium_renderer_t -after forking a renderer. The policy in this directory defines access vectors -for chromium_renderer_t. - -To install: - % make -f /usr/share/selinux/devel/Makefile - % sudo /usr/sbin/semodule -i chromium-browser.pp diff --git a/sandbox/linux/selinux/chromium-browser.if b/sandbox/linux/selinux/chromium-browser.if deleted file mode 100644 index 3eb6a3057b..0000000000 --- a/sandbox/linux/selinux/chromium-browser.if +++ /dev/null @@ -1 +0,0 @@ -## <summary></summary> diff --git a/sandbox/linux/selinux/chromium-browser.te b/sandbox/linux/selinux/chromium-browser.te deleted file mode 100644 index ae2f8b7a46..0000000000 --- a/sandbox/linux/selinux/chromium-browser.te +++ /dev/null @@ -1,40 +0,0 @@ -policy_module(chromium-browser,1.0.0) - -gen_require(` - type gnome_home_t; - type proc_t; - type tmpfs_t; - type unconfined_t; - type urandom_device_t; - type user_devpts_t; - type user_tmpfs_t; -') - -type chromium_renderer_t; -domain_base_type(chromium_renderer_t) -role unconfined_r types chromium_renderer_t; - -allow unconfined_t chromium_renderer_t:process { dyntransition }; - -allow chromium_renderer_t unconfined_t:unix_stream_socket { read write send_msg recv_msg }; -allow unconfined_t chromium_renderer_t:unix_stream_socket { read write send_msg recv_msg }; - -allow chromium_renderer_t urandom_device_t:chr_file { read }; -allow chromium_renderer_t user_devpts_t:chr_file { write }; -allow chromium_renderer_t self:process { execmem }; -allow chromium_renderer_t self:fifo_file { read write }; -allow chromium_renderer_t self:unix_dgram_socket { read write create send_msg recv_msg sendto }; -allow chromium_renderer_t unconfined_t:unix_dgram_socket { read write send_msg recv_msg }; -allow unconfined_t chromium_renderer_t:unix_dgram_socket { read write send_msg recv_msg }; -allow chromium_renderer_t user_tmpfs_t:file { read write append open getattr }; -allow chromium_renderer_t tmpfs_t:file { read write }; -allow chromium_renderer_t self:shm { create destroy getattr setattr read write associate unix_read unix_write }; - -# For reading dictionaries out of the user-data-dir -allow chromium_renderer_t gnome_home_t:file { read getattr }; - -miscfiles_read_localization(chromium_renderer_t); -miscfiles_read_fonts(chromium_renderer_t); - -# The renderer will attempt to read meminfo -dontaudit chromium_renderer_t proc_t:file { read }; diff --git a/sandbox/linux/services/libc_urandom_override.cc b/sandbox/linux/services/libc_urandom_override.cc index 3f9957222f..dfb4c269e3 100644 --- a/sandbox/linux/services/libc_urandom_override.cc +++ b/sandbox/linux/services/libc_urandom_override.cc @@ -18,10 +18,6 @@ namespace sandbox { -// With SELinux we can carve out a precise sandbox, so we don't have to play -// with intercepting libc calls. -#if !defined(CHROMIUM_SELINUX) - static bool g_override_urandom = false; void InitLibcUrandomOverrides() { @@ -162,6 +158,4 @@ int xstat64_override(int version, const char *path, struct stat64 *buf) { #endif // !ADDRESS_SANITIZER -#endif // !CHROMIUM_SELINUX - } // namespace content diff --git a/sandbox/linux/services/libc_urandom_override.h b/sandbox/linux/services/libc_urandom_override.h index 1990313b9c..86212f8bc4 100644 --- a/sandbox/linux/services/libc_urandom_override.h +++ b/sandbox/linux/services/libc_urandom_override.h @@ -7,12 +7,8 @@ namespace sandbox { -#if !defined(CHROMIUM_SELINUX) - void InitLibcUrandomOverrides(); -#endif // !CHROMIUM_SELINUX - } // namespace sandbox #endif // SANDBOX_LINUX_SERVICES_LIBC_URANDOM_OVERRIDE_H_ diff --git a/sandbox/sandbox_services.target.darwin-arm.mk b/sandbox/sandbox_services.target.darwin-arm.mk index fd6e67a2f1..419b43957a 100644 --- a/sandbox/sandbox_services.target.darwin-arm.mk +++ b/sandbox/sandbox_services.target.darwin-arm.mk @@ -67,6 +67,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -91,9 +92,9 @@ LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ $(LOCAL_PATH) \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services.target.darwin-x86.mk b/sandbox/sandbox_services.target.darwin-x86.mk index 42973fe4d6..40020b7cd4 100644 --- a/sandbox/sandbox_services.target.darwin-x86.mk +++ b/sandbox/sandbox_services.target.darwin-x86.mk @@ -69,6 +69,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -93,9 +94,9 @@ LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ $(LOCAL_PATH) \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services.target.linux-arm.mk b/sandbox/sandbox_services.target.linux-arm.mk index fd6e67a2f1..419b43957a 100644 --- a/sandbox/sandbox_services.target.linux-arm.mk +++ b/sandbox/sandbox_services.target.linux-arm.mk @@ -67,6 +67,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -91,9 +92,9 @@ LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ $(LOCAL_PATH) \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services.target.linux-x86.mk b/sandbox/sandbox_services.target.linux-x86.mk index 42973fe4d6..40020b7cd4 100644 --- a/sandbox/sandbox_services.target.linux-x86.mk +++ b/sandbox/sandbox_services.target.linux-x86.mk @@ -69,6 +69,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -93,9 +94,9 @@ LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ $(LOCAL_PATH) \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services_headers.target.darwin-arm.mk b/sandbox/sandbox_services_headers.target.darwin-arm.mk index c4cb2b54c7..8aa0023842 100644 --- a/sandbox/sandbox_services_headers.target.darwin-arm.mk +++ b/sandbox/sandbox_services_headers.target.darwin-arm.mk @@ -66,6 +66,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -88,9 +89,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) # Include paths placed before CFLAGS/CPPFLAGS LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services_headers.target.darwin-x86.mk b/sandbox/sandbox_services_headers.target.darwin-x86.mk index eb03ce2789..28e12f5b22 100644 --- a/sandbox/sandbox_services_headers.target.darwin-x86.mk +++ b/sandbox/sandbox_services_headers.target.darwin-x86.mk @@ -68,6 +68,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -90,9 +91,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) # Include paths placed before CFLAGS/CPPFLAGS LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services_headers.target.linux-arm.mk b/sandbox/sandbox_services_headers.target.linux-arm.mk index c4cb2b54c7..8aa0023842 100644 --- a/sandbox/sandbox_services_headers.target.linux-arm.mk +++ b/sandbox/sandbox_services_headers.target.linux-arm.mk @@ -66,6 +66,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -88,9 +89,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) # Include paths placed before CFLAGS/CPPFLAGS LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/sandbox_services_headers.target.linux-x86.mk b/sandbox/sandbox_services_headers.target.linux-x86.mk index eb03ce2789..28e12f5b22 100644 --- a/sandbox/sandbox_services_headers.target.linux-x86.mk +++ b/sandbox/sandbox_services_headers.target.linux-x86.mk @@ -68,6 +68,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -90,9 +91,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) # Include paths placed before CFLAGS/CPPFLAGS LOCAL_C_INCLUDES := \ $(LOCAL_PATH)/sandbox \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/seccomp_bpf.target.darwin-arm.mk b/sandbox/seccomp_bpf.target.darwin-arm.mk index 2924094cf2..eb3cf3fd93 100644 --- a/sandbox/seccomp_bpf.target.darwin-arm.mk +++ b/sandbox/seccomp_bpf.target.darwin-arm.mk @@ -76,6 +76,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -99,9 +100,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) LOCAL_C_INCLUDES := \ $(LOCAL_PATH) \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/seccomp_bpf.target.darwin-x86.mk b/sandbox/seccomp_bpf.target.darwin-x86.mk index f61f6e2f74..73a83e471c 100644 --- a/sandbox/seccomp_bpf.target.darwin-x86.mk +++ b/sandbox/seccomp_bpf.target.darwin-x86.mk @@ -78,6 +78,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -101,9 +102,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) LOCAL_C_INCLUDES := \ $(LOCAL_PATH) \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/seccomp_bpf.target.linux-arm.mk b/sandbox/seccomp_bpf.target.linux-arm.mk index 2924094cf2..eb3cf3fd93 100644 --- a/sandbox/seccomp_bpf.target.linux-arm.mk +++ b/sandbox/seccomp_bpf.target.linux-arm.mk @@ -76,6 +76,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -99,9 +100,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) LOCAL_C_INCLUDES := \ $(LOCAL_PATH) \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/seccomp_bpf.target.linux-x86.mk b/sandbox/seccomp_bpf.target.linux-x86.mk index f61f6e2f74..73a83e471c 100644 --- a/sandbox/seccomp_bpf.target.linux-x86.mk +++ b/sandbox/seccomp_bpf.target.linux-x86.mk @@ -78,6 +78,7 @@ MY_DEFS := \ '-DNO_TCMALLOC' \ '-DDISABLE_NACL' \ '-DCHROMIUM_BUILD' \ + '-DENABLE_DOUBLE_RESOURCE_LOAD_TIMING' \ '-DUSE_LIBJPEG_TURBO=1' \ '-DUSE_PROPRIETARY_CODECS' \ '-DENABLE_GPU=1' \ @@ -101,9 +102,9 @@ LOCAL_CFLAGS := $(MY_CFLAGS_C) $(MY_CFLAGS) $(MY_DEFS) LOCAL_C_INCLUDES := \ $(LOCAL_PATH) \ $(gyp_shared_intermediate_dir)/shim_headers/ashmem/target \ - $(GYP_ABS_ANDROID_TOP_DIR)/frameworks/wilhelm/include \ - $(GYP_ABS_ANDROID_TOP_DIR)/bionic \ - $(GYP_ABS_ANDROID_TOP_DIR)/external/stlport/stlport + $(PWD)/frameworks/wilhelm/include \ + $(PWD)/bionic \ + $(PWD)/external/stlport/stlport LOCAL_C_INCLUDES := $(GYP_COPIED_SOURCE_ORIGIN_DIRS) $(LOCAL_C_INCLUDES) diff --git a/sandbox/win/src/policy_params.h b/sandbox/win/src/policy_params.h index 686d08fa8c..7ded1fcfc4 100644 --- a/sandbox/win/src/policy_params.h +++ b/sandbox/win/src/policy_params.h @@ -32,8 +32,10 @@ POLPARAMS_BEGIN(FileName) POLPARAM(BROKER) // TRUE if called from the broker. POLPARAMS_END(FileName) -COMPILE_ASSERT(OpenFile::NAME == FileName::NAME, to_simplify_fs_policies); -COMPILE_ASSERT(OpenFile::BROKER == FileName::BROKER, to_simplify_fs_policies); +COMPILE_ASSERT(OpenFile::NAME == static_cast<int>(FileName::NAME), + to_simplify_fs_policies); +COMPILE_ASSERT(OpenFile::BROKER == static_cast<int>(FileName::BROKER), + to_simplify_fs_policies); // Policy parameter for name-based policies. POLPARAMS_BEGIN(NameBased) |