summaryrefslogtreecommitdiffstats
path: root/sandbox
diff options
context:
space:
mode:
authordeanm@chromium.org <deanm@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-21 18:16:20 +0000
committerdeanm@chromium.org <deanm@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-21 18:16:20 +0000
commit38b1503bd0d90f090744bd0a875a7d6975401aff (patch)
tree153d07b644c86b9919111a1d2d42cfa81bea71d1 /sandbox
parent3bb1cd99625369d3aed8bc45215abb80fdab54cd (diff)
downloadchromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.zip
chromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.tar.gz
chromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.tar.bz2
Hide seccomp sandbox from !X86
This CL moves the seccomp sandbox callsite behind an ifdef arch x86 and makes the gyp target conditional on !ARM. Patch by Joel Stanley <joel@jms.id.au> BUG=19953 Review URL: http://codereview.chromium.org/173201 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@23984 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r--sandbox/sandbox.gyp78
1 files changed, 41 insertions, 37 deletions
diff --git a/sandbox/sandbox.gyp b/sandbox/sandbox.gyp
index 72b3af3..987dbea 100644
--- a/sandbox/sandbox.gyp
+++ b/sandbox/sandbox.gyp
@@ -35,44 +35,48 @@
'dependencies': [
'../base/base.gyp:base',
],
- 'sources': [
- 'linux/seccomp/access.cc',
- 'linux/seccomp/clone.cc',
- 'linux/seccomp/exit.cc',
- 'linux/seccomp/debug.cc',
- 'linux/seccomp/getpid.cc',
- 'linux/seccomp/gettid.cc',
- 'linux/seccomp/ioctl.cc',
- 'linux/seccomp/ipc.cc',
- 'linux/seccomp/library.cc',
- 'linux/seccomp/library.h',
- 'linux/seccomp/linux_syscall_support.h',
- 'linux/seccomp/madvise.cc',
- 'linux/seccomp/maps.cc',
- 'linux/seccomp/maps.h',
- 'linux/seccomp/mmap.cc',
- 'linux/seccomp/mprotect.cc',
- 'linux/seccomp/munmap.cc',
- 'linux/seccomp/mutex.h',
- 'linux/seccomp/open.cc',
- 'linux/seccomp/sandbox.cc',
- 'linux/seccomp/sandbox.h',
- 'linux/seccomp/sandbox_impl.h',
- 'linux/seccomp/securemem.cc',
- 'linux/seccomp/securemem.h',
- 'linux/seccomp/socketcall.cc',
- 'linux/seccomp/stat.cc',
- 'linux/seccomp/syscall.cc',
- 'linux/seccomp/syscall.h',
- 'linux/seccomp/syscall_table.c',
- 'linux/seccomp/syscall_table.h',
- 'linux/seccomp/tls.h',
- 'linux/seccomp/trusted_process.cc',
- 'linux/seccomp/trusted_thread.cc',
- 'linux/seccomp/x86_decode.cc',
- 'linux/seccomp/x86_decode.h',
+ 'conditions': [
+ ['target_arch!="arm"', {
+ 'sources': [
+ 'linux/seccomp/access.cc',
+ 'linux/seccomp/clone.cc',
+ 'linux/seccomp/exit.cc',
+ 'linux/seccomp/debug.cc',
+ 'linux/seccomp/getpid.cc',
+ 'linux/seccomp/gettid.cc',
+ 'linux/seccomp/ioctl.cc',
+ 'linux/seccomp/ipc.cc',
+ 'linux/seccomp/library.cc',
+ 'linux/seccomp/library.h',
+ 'linux/seccomp/linux_syscall_support.h',
+ 'linux/seccomp/madvise.cc',
+ 'linux/seccomp/maps.cc',
+ 'linux/seccomp/maps.h',
+ 'linux/seccomp/mmap.cc',
+ 'linux/seccomp/mprotect.cc',
+ 'linux/seccomp/munmap.cc',
+ 'linux/seccomp/mutex.h',
+ 'linux/seccomp/open.cc',
+ 'linux/seccomp/sandbox.cc',
+ 'linux/seccomp/sandbox.h',
+ 'linux/seccomp/sandbox_impl.h',
+ 'linux/seccomp/securemem.cc',
+ 'linux/seccomp/securemem.h',
+ 'linux/seccomp/socketcall.cc',
+ 'linux/seccomp/stat.cc',
+ 'linux/seccomp/syscall.cc',
+ 'linux/seccomp/syscall.h',
+ 'linux/seccomp/syscall_table.c',
+ 'linux/seccomp/syscall_table.h',
+ 'linux/seccomp/tls.h',
+ 'linux/seccomp/trusted_process.cc',
+ 'linux/seccomp/trusted_thread.cc',
+ 'linux/seccomp/x86_decode.cc',
+ 'linux/seccomp/x86_decode.h',
+ ],
+ },
],
- },
+ ]},
],
}],
[ 'OS=="win"', {