summaryrefslogtreecommitdiffstats
path: root/sandbox
diff options
context:
space:
mode:
authormseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-20 13:54:28 +0000
committermseaborn@chromium.org <mseaborn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-20 13:54:28 +0000
commit99737847fa07c0d15469b6d4fb02b9ccc55429a6 (patch)
treed037d5f8fa83b5d468537f4fbd1732d3a5514f46 /sandbox
parentdb3fb1cb119f862b96ca3de8f74ff647fef6f94e (diff)
downloadchromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.zip
chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.gz
chromium_src-99737847fa07c0d15469b6d4fb02b9ccc55429a6.tar.bz2
seccomp sandbox: Split source file list into a separate .gyp file
The intention behind this is to make it easier to sync the .gyp file into the non-Chromium copy of the seccomp sandbox so that it can be used to build a standalone version of the sandbox. Also, it arguably makes the .gyp files more manageable. Removes a dependency on "base", which the seccomp sandbox does not use. BUG=none TEST=none Review URL: http://codereview.chromium.org/1939002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@47792 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r--sandbox/linux/seccomp/seccomp.gyp63
-rw-r--r--sandbox/sandbox.gyp56
2 files changed, 67 insertions, 52 deletions
diff --git a/sandbox/linux/seccomp/seccomp.gyp b/sandbox/linux/seccomp/seccomp.gyp
new file mode 100644
index 0000000..ea22796
--- /dev/null
+++ b/sandbox/linux/seccomp/seccomp.gyp
@@ -0,0 +1,63 @@
+# Copyright (c) 2010 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+{
+ 'variables': {
+ 'chromium_code': 1,
+ },
+ 'targets': [
+ {
+ 'target_name': 'seccomp_sandbox',
+ 'type': 'static_library',
+ 'sources': [
+ 'access.cc',
+ 'allocator.cc',
+ 'allocator.h',
+ 'clone.cc',
+ 'exit.cc',
+ 'debug.cc',
+ 'getpid.cc',
+ 'gettid.cc',
+ 'ioctl.cc',
+ 'ipc.cc',
+ 'library.cc',
+ 'library.h',
+ 'linux_syscall_support.h',
+ 'madvise.cc',
+ 'maps.cc',
+ 'maps.h',
+ 'mmap.cc',
+ 'mprotect.cc',
+ 'munmap.cc',
+ 'mutex.h',
+ 'open.cc',
+ 'sandbox.cc',
+ 'sandbox.h',
+ 'sandbox_impl.h',
+ 'securemem.cc',
+ 'securemem.h',
+ 'sigaction.cc',
+ 'sigprocmask.cc',
+ 'socketcall.cc',
+ 'stat.cc',
+ 'syscall.cc',
+ 'syscall.h',
+ 'syscall_table.c',
+ 'syscall_table.h',
+ 'tls.h',
+ 'trusted_process.cc',
+ 'trusted_thread.cc',
+ 'x86_decode.cc',
+ 'x86_decode.h',
+ ],
+ },
+ {
+ 'target_name': 'timestats',
+ 'type': 'executable',
+ 'sources': [
+ 'timestats.cc',
+ ],
+ },
+ ],
+}
diff --git a/sandbox/sandbox.gyp b/sandbox/sandbox.gyp
index 3100509..706cba2 100644
--- a/sandbox/sandbox.gyp
+++ b/sandbox/sandbox.gyp
@@ -158,60 +158,12 @@
{
'target_name': 'sandbox',
'type': '<(library)',
- 'dependencies': [
- '../base/base.gyp:base',
- ],
'conditions': [
['target_arch!="arm"', {
- 'sources': [
- 'linux/seccomp/access.cc',
- 'linux/seccomp/allocator.cc',
- 'linux/seccomp/allocator.h',
- 'linux/seccomp/clone.cc',
- 'linux/seccomp/exit.cc',
- 'linux/seccomp/debug.cc',
- 'linux/seccomp/getpid.cc',
- 'linux/seccomp/gettid.cc',
- 'linux/seccomp/ioctl.cc',
- 'linux/seccomp/ipc.cc',
- 'linux/seccomp/library.cc',
- 'linux/seccomp/library.h',
- 'linux/seccomp/linux_syscall_support.h',
- 'linux/seccomp/madvise.cc',
- 'linux/seccomp/maps.cc',
- 'linux/seccomp/maps.h',
- 'linux/seccomp/mmap.cc',
- 'linux/seccomp/mprotect.cc',
- 'linux/seccomp/munmap.cc',
- 'linux/seccomp/mutex.h',
- 'linux/seccomp/open.cc',
- 'linux/seccomp/sandbox.cc',
- 'linux/seccomp/sandbox.h',
- 'linux/seccomp/sandbox_impl.h',
- 'linux/seccomp/securemem.cc',
- 'linux/seccomp/securemem.h',
- 'linux/seccomp/sigaction.cc',
- 'linux/seccomp/sigprocmask.cc',
- 'linux/seccomp/socketcall.cc',
- 'linux/seccomp/stat.cc',
- 'linux/seccomp/syscall.cc',
- 'linux/seccomp/syscall.h',
- 'linux/seccomp/syscall_table.c',
- 'linux/seccomp/syscall_table.h',
- 'linux/seccomp/tls.h',
- 'linux/seccomp/trusted_process.cc',
- 'linux/seccomp/trusted_thread.cc',
- 'linux/seccomp/x86_decode.cc',
- 'linux/seccomp/x86_decode.h',
- ],
- },
- ],
- ]},
- {
- 'target_name': 'timestats',
- 'type': 'executable',
- 'sources': [
- 'linux/seccomp/timestats.cc',
+ 'dependencies': [
+ 'linux/seccomp/seccomp.gyp:seccomp_sandbox',
+ ]},
+ ],
],
},
],