diff options
author | mseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-20 13:54:28 +0000 |
---|---|---|
committer | mseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-20 13:54:28 +0000 |
commit | 99737847fa07c0d15469b6d4fb02b9ccc55429a6 (patch) | |
tree | d037d5f8fa83b5d468537f4fbd1732d3a5514f46 /sandbox | |
parent | db3fb1cb119f862b96ca3de8f74ff647fef6f94e (diff) | |
download | chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.zip chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.gz chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.bz2 |
seccomp sandbox: Split source file list into a separate .gyp file
The intention behind this is to make it easier to sync the .gyp file
into the non-Chromium copy of the seccomp sandbox so that it can be
used to build a standalone version of the sandbox.
Also, it arguably makes the .gyp files more manageable.
Removes a dependency on "base", which the seccomp sandbox does not use.
BUG=none
TEST=none
Review URL: http://codereview.chromium.org/1939002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@47792 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r-- | sandbox/linux/seccomp/seccomp.gyp | 63 | ||||
-rw-r--r-- | sandbox/sandbox.gyp | 56 |
2 files changed, 67 insertions, 52 deletions
diff --git a/sandbox/linux/seccomp/seccomp.gyp b/sandbox/linux/seccomp/seccomp.gyp new file mode 100644 index 0000000..ea22796 --- /dev/null +++ b/sandbox/linux/seccomp/seccomp.gyp @@ -0,0 +1,63 @@ +# Copyright (c) 2010 The Chromium Authors. All rights reserved. +# Use of this source code is governed by a BSD-style license that can be +# found in the LICENSE file. + +{ + 'variables': { + 'chromium_code': 1, + }, + 'targets': [ + { + 'target_name': 'seccomp_sandbox', + 'type': 'static_library', + 'sources': [ + 'access.cc', + 'allocator.cc', + 'allocator.h', + 'clone.cc', + 'exit.cc', + 'debug.cc', + 'getpid.cc', + 'gettid.cc', + 'ioctl.cc', + 'ipc.cc', + 'library.cc', + 'library.h', + 'linux_syscall_support.h', + 'madvise.cc', + 'maps.cc', + 'maps.h', + 'mmap.cc', + 'mprotect.cc', + 'munmap.cc', + 'mutex.h', + 'open.cc', + 'sandbox.cc', + 'sandbox.h', + 'sandbox_impl.h', + 'securemem.cc', + 'securemem.h', + 'sigaction.cc', + 'sigprocmask.cc', + 'socketcall.cc', + 'stat.cc', + 'syscall.cc', + 'syscall.h', + 'syscall_table.c', + 'syscall_table.h', + 'tls.h', + 'trusted_process.cc', + 'trusted_thread.cc', + 'x86_decode.cc', + 'x86_decode.h', + ], + }, + { + 'target_name': 'timestats', + 'type': 'executable', + 'sources': [ + 'timestats.cc', + ], + }, + ], +} diff --git a/sandbox/sandbox.gyp b/sandbox/sandbox.gyp index 3100509..706cba2 100644 --- a/sandbox/sandbox.gyp +++ b/sandbox/sandbox.gyp @@ -158,60 +158,12 @@ { 'target_name': 'sandbox', 'type': '<(library)', - 'dependencies': [ - '../base/base.gyp:base', - ], 'conditions': [ ['target_arch!="arm"', { - 'sources': [ - 'linux/seccomp/access.cc', - 'linux/seccomp/allocator.cc', - 'linux/seccomp/allocator.h', - 'linux/seccomp/clone.cc', - 'linux/seccomp/exit.cc', - 'linux/seccomp/debug.cc', - 'linux/seccomp/getpid.cc', - 'linux/seccomp/gettid.cc', - 'linux/seccomp/ioctl.cc', - 'linux/seccomp/ipc.cc', - 'linux/seccomp/library.cc', - 'linux/seccomp/library.h', - 'linux/seccomp/linux_syscall_support.h', - 'linux/seccomp/madvise.cc', - 'linux/seccomp/maps.cc', - 'linux/seccomp/maps.h', - 'linux/seccomp/mmap.cc', - 'linux/seccomp/mprotect.cc', - 'linux/seccomp/munmap.cc', - 'linux/seccomp/mutex.h', - 'linux/seccomp/open.cc', - 'linux/seccomp/sandbox.cc', - 'linux/seccomp/sandbox.h', - 'linux/seccomp/sandbox_impl.h', - 'linux/seccomp/securemem.cc', - 'linux/seccomp/securemem.h', - 'linux/seccomp/sigaction.cc', - 'linux/seccomp/sigprocmask.cc', - 'linux/seccomp/socketcall.cc', - 'linux/seccomp/stat.cc', - 'linux/seccomp/syscall.cc', - 'linux/seccomp/syscall.h', - 'linux/seccomp/syscall_table.c', - 'linux/seccomp/syscall_table.h', - 'linux/seccomp/tls.h', - 'linux/seccomp/trusted_process.cc', - 'linux/seccomp/trusted_thread.cc', - 'linux/seccomp/x86_decode.cc', - 'linux/seccomp/x86_decode.h', - ], - }, - ], - ]}, - { - 'target_name': 'timestats', - 'type': 'executable', - 'sources': [ - 'linux/seccomp/timestats.cc', + 'dependencies': [ + 'linux/seccomp/seccomp.gyp:seccomp_sandbox', + ]}, + ], ], }, ], |