diff options
author | markus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-08-11 21:46:07 +0000 |
---|---|---|
committer | markus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-08-11 21:46:07 +0000 |
commit | 0fb2bd939380e4d46bad10eb597bff4980ca7db2 (patch) | |
tree | 79d017b24dfb4d91059b856da7b8ad43764d76e6 /sandbox/sandbox.gyp | |
parent | 135b165d2bca7a9a7302eb4f771dc713c8100edb (diff) | |
download | chromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.zip chromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.tar.gz chromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.tar.bz2 |
Initial version of the Seccomp sandbox. Imported from http://code.google.com/p/seccompsandbox/
Make the seccomp sandbox dependant on the --enable-seccomp-sandbox flag
Review URL: http://codereview.chromium.org/165310
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@23087 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/sandbox.gyp')
-rw-r--r-- | sandbox/sandbox.gyp | 46 |
1 files changed, 45 insertions, 1 deletions
diff --git a/sandbox/sandbox.gyp b/sandbox/sandbox.gyp index d711f83..72b3af3 100644 --- a/sandbox/sandbox.gyp +++ b/sandbox/sandbox.gyp @@ -28,7 +28,51 @@ 'include_dirs': [ '..', ], - } + }, + { + 'target_name': 'sandbox', + 'type': '<(library)', + 'dependencies': [ + '../base/base.gyp:base', + ], + 'sources': [ + 'linux/seccomp/access.cc', + 'linux/seccomp/clone.cc', + 'linux/seccomp/exit.cc', + 'linux/seccomp/debug.cc', + 'linux/seccomp/getpid.cc', + 'linux/seccomp/gettid.cc', + 'linux/seccomp/ioctl.cc', + 'linux/seccomp/ipc.cc', + 'linux/seccomp/library.cc', + 'linux/seccomp/library.h', + 'linux/seccomp/linux_syscall_support.h', + 'linux/seccomp/madvise.cc', + 'linux/seccomp/maps.cc', + 'linux/seccomp/maps.h', + 'linux/seccomp/mmap.cc', + 'linux/seccomp/mprotect.cc', + 'linux/seccomp/munmap.cc', + 'linux/seccomp/mutex.h', + 'linux/seccomp/open.cc', + 'linux/seccomp/sandbox.cc', + 'linux/seccomp/sandbox.h', + 'linux/seccomp/sandbox_impl.h', + 'linux/seccomp/securemem.cc', + 'linux/seccomp/securemem.h', + 'linux/seccomp/socketcall.cc', + 'linux/seccomp/stat.cc', + 'linux/seccomp/syscall.cc', + 'linux/seccomp/syscall.h', + 'linux/seccomp/syscall_table.c', + 'linux/seccomp/syscall_table.h', + 'linux/seccomp/tls.h', + 'linux/seccomp/trusted_process.cc', + 'linux/seccomp/trusted_thread.cc', + 'linux/seccomp/x86_decode.cc', + 'linux/seccomp/x86_decode.h', + ], + }, ], }], [ 'OS=="win"', { |