summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
diff options
context:
space:
mode:
authormseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-20 13:54:28 +0000
committermseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-20 13:54:28 +0000
commit99737847fa07c0d15469b6d4fb02b9ccc55429a6 (patch)
treed037d5f8fa83b5d468537f4fbd1732d3a5514f46 /sandbox/linux
parentdb3fb1cb119f862b96ca3de8f74ff647fef6f94e (diff)
downloadchromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.zip
chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.gz
chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.bz2
seccomp sandbox: Split source file list into a separate .gyp file
The intention behind this is to make it easier to sync the .gyp file into the non-Chromium copy of the seccomp sandbox so that it can be used to build a standalone version of the sandbox. Also, it arguably makes the .gyp files more manageable. Removes a dependency on "base", which the seccomp sandbox does not use. BUG=none TEST=none Review URL: http://codereview.chromium.org/1939002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@47792 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux')
-rw-r--r--sandbox/linux/seccomp/seccomp.gyp63
1 files changed, 63 insertions, 0 deletions
diff --git a/sandbox/linux/seccomp/seccomp.gyp b/sandbox/linux/seccomp/seccomp.gyp
new file mode 100644
index 0000000..ea22796
--- /dev/null
+++ b/sandbox/linux/seccomp/seccomp.gyp
@@ -0,0 +1,63 @@
+# Copyright (c) 2010 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+{
+ 'variables': {
+ 'chromium_code': 1,
+ },
+ 'targets': [
+ {
+ 'target_name': 'seccomp_sandbox',
+ 'type': 'static_library',
+ 'sources': [
+ 'access.cc',
+ 'allocator.cc',
+ 'allocator.h',
+ 'clone.cc',
+ 'exit.cc',
+ 'debug.cc',
+ 'getpid.cc',
+ 'gettid.cc',
+ 'ioctl.cc',
+ 'ipc.cc',
+ 'library.cc',
+ 'library.h',
+ 'linux_syscall_support.h',
+ 'madvise.cc',
+ 'maps.cc',
+ 'maps.h',
+ 'mmap.cc',
+ 'mprotect.cc',
+ 'munmap.cc',
+ 'mutex.h',
+ 'open.cc',
+ 'sandbox.cc',
+ 'sandbox.h',
+ 'sandbox_impl.h',
+ 'securemem.cc',
+ 'securemem.h',
+ 'sigaction.cc',
+ 'sigprocmask.cc',
+ 'socketcall.cc',
+ 'stat.cc',
+ 'syscall.cc',
+ 'syscall.h',
+ 'syscall_table.c',
+ 'syscall_table.h',
+ 'tls.h',
+ 'trusted_process.cc',
+ 'trusted_thread.cc',
+ 'x86_decode.cc',
+ 'x86_decode.h',
+ ],
+ },
+ {
+ 'target_name': 'timestats',
+ 'type': 'executable',
+ 'sources': [
+ 'timestats.cc',
+ ],
+ },
+ ],
+}