Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(526)

Side by Side Diff: sandbox/linux/sandbox_linux.gypi

Issue 11096012: Add a platform-specific syscall number iterator. (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Addressed nits. Created 8 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « content/common/sandbox_seccomp_bpf_linux.cc ('k') | sandbox/linux/seccomp-bpf/Makefile » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 # Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 # Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 # Use of this source code is governed by a BSD-style license that can be 2 # Use of this source code is governed by a BSD-style license that can be
3 # found in the LICENSE file. 3 # found in the LICENSE file.
4 4
5 { 5 {
6 'targets': [ 6 'targets': [
7 # We have two principal targets: sandbox and sandbox_linux_unittests 7 # We have two principal targets: sandbox and sandbox_linux_unittests
8 # All other targets are listed as dependencies. 8 # All other targets are listed as dependencies.
9 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox 9 # FIXME(jln): for historial reasons, sandbox_linux is the setuid sandbox
10 # and is its own target. 10 # and is its own target.
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after
50 '../..', 50 '../..',
51 ], 51 ],
52 'conditions': [ 52 'conditions': [
53 [ 'OS=="linux" and (target_arch=="ia32" or target_arch=="x64" ' 53 [ 'OS=="linux" and (target_arch=="ia32" or target_arch=="x64" '
54 'or target_arch=="arm")', { 54 'or target_arch=="arm")', {
55 'sources': [ 55 'sources': [
56 'seccomp-bpf/bpf_tests.cc', 56 'seccomp-bpf/bpf_tests.cc',
57 'seccomp-bpf/bpf_tests.h', 57 'seccomp-bpf/bpf_tests.h',
58 'seccomp-bpf/errorcode_unittest.cc', 58 'seccomp-bpf/errorcode_unittest.cc',
59 'seccomp-bpf/sandbox_bpf_unittest.cc', 59 'seccomp-bpf/sandbox_bpf_unittest.cc',
60 'seccomp-bpf/syscall_iterator_unittest.cc',
60 ], 61 ],
61 }], 62 }],
62 ], 63 ],
63 }, 64 },
64 { 65 {
65 'target_name': 'seccomp_bpf', 66 'target_name': 'seccomp_bpf',
66 'type': 'static_library', 67 'type': 'static_library',
67 'sources': [ 68 'sources': [
68 'seccomp-bpf/die.cc', 69 'seccomp-bpf/die.cc',
69 'seccomp-bpf/die.h', 70 'seccomp-bpf/die.h',
70 'seccomp-bpf/errorcode.cc', 71 'seccomp-bpf/errorcode.cc',
71 'seccomp-bpf/errorcode.h', 72 'seccomp-bpf/errorcode.h',
72 'seccomp-bpf/sandbox_bpf.cc', 73 'seccomp-bpf/sandbox_bpf.cc',
73 'seccomp-bpf/sandbox_bpf.h', 74 'seccomp-bpf/sandbox_bpf.h',
75 'seccomp-bpf/syscall_iterator.cc',
76 'seccomp-bpf/syscall_iterator.h',
74 'seccomp-bpf/verifier.cc', 77 'seccomp-bpf/verifier.cc',
75 'seccomp-bpf/verifier.h', 78 'seccomp-bpf/verifier.h',
76 ], 79 ],
77 'dependencies': [ 80 'dependencies': [
78 '../base/base.gyp:base', 81 '../base/base.gyp:base',
79 ], 82 ],
80 'include_dirs': [ 83 'include_dirs': [
81 '../..', 84 '../..',
82 ], 85 ],
83 }, 86 },
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
128 'dependencies': [ 131 'dependencies': [
129 '../base/base.gyp:base', 132 '../base/base.gyp:base',
130 ], 133 ],
131 'include_dirs': [ 134 'include_dirs': [
132 '..', 135 '..',
133 ], 136 ],
134 }, 137 },
135 138
136 ], 139 ],
137 } 140 }
OLDNEW
« no previous file with comments | « content/common/sandbox_seccomp_bpf_linux.cc ('k') | sandbox/linux/seccomp-bpf/Makefile » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698