summaryrefslogtreecommitdiffstats
path: root/sandbox/sandbox.gyp
diff options
context:
space:
mode:
authormarkus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-11 21:46:07 +0000
committermarkus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-11 21:46:07 +0000
commit0fb2bd939380e4d46bad10eb597bff4980ca7db2 (patch)
tree79d017b24dfb4d91059b856da7b8ad43764d76e6 /sandbox/sandbox.gyp
parent135b165d2bca7a9a7302eb4f771dc713c8100edb (diff)
downloadchromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.zip
chromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.tar.gz
chromium_src-0fb2bd939380e4d46bad10eb597bff4980ca7db2.tar.bz2
Initial version of the Seccomp sandbox. Imported from http://code.google.com/p/seccompsandbox/
Make the seccomp sandbox dependant on the --enable-seccomp-sandbox flag Review URL: http://codereview.chromium.org/165310 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@23087 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/sandbox.gyp')
-rw-r--r--sandbox/sandbox.gyp46
1 files changed, 45 insertions, 1 deletions
diff --git a/sandbox/sandbox.gyp b/sandbox/sandbox.gyp
index d711f83..72b3af3 100644
--- a/sandbox/sandbox.gyp
+++ b/sandbox/sandbox.gyp
@@ -28,7 +28,51 @@
'include_dirs': [
'..',
],
- }
+ },
+ {
+ 'target_name': 'sandbox',
+ 'type': '<(library)',
+ 'dependencies': [
+ '../base/base.gyp:base',
+ ],
+ 'sources': [
+ 'linux/seccomp/access.cc',
+ 'linux/seccomp/clone.cc',
+ 'linux/seccomp/exit.cc',
+ 'linux/seccomp/debug.cc',
+ 'linux/seccomp/getpid.cc',
+ 'linux/seccomp/gettid.cc',
+ 'linux/seccomp/ioctl.cc',
+ 'linux/seccomp/ipc.cc',
+ 'linux/seccomp/library.cc',
+ 'linux/seccomp/library.h',
+ 'linux/seccomp/linux_syscall_support.h',
+ 'linux/seccomp/madvise.cc',
+ 'linux/seccomp/maps.cc',
+ 'linux/seccomp/maps.h',
+ 'linux/seccomp/mmap.cc',
+ 'linux/seccomp/mprotect.cc',
+ 'linux/seccomp/munmap.cc',
+ 'linux/seccomp/mutex.h',
+ 'linux/seccomp/open.cc',
+ 'linux/seccomp/sandbox.cc',
+ 'linux/seccomp/sandbox.h',
+ 'linux/seccomp/sandbox_impl.h',
+ 'linux/seccomp/securemem.cc',
+ 'linux/seccomp/securemem.h',
+ 'linux/seccomp/socketcall.cc',
+ 'linux/seccomp/stat.cc',
+ 'linux/seccomp/syscall.cc',
+ 'linux/seccomp/syscall.h',
+ 'linux/seccomp/syscall_table.c',
+ 'linux/seccomp/syscall_table.h',
+ 'linux/seccomp/tls.h',
+ 'linux/seccomp/trusted_process.cc',
+ 'linux/seccomp/trusted_thread.cc',
+ 'linux/seccomp/x86_decode.cc',
+ 'linux/seccomp/x86_decode.h',
+ ],
+ },
],
}],
[ 'OS=="win"', {