Linux sandbox: split linux_seccomp. in three.
This splits linux_seccomp.h into three logical parts:
- system_headers/linux_seccomp.h: things that are define by the kernel header.
- bpf_dsl/linux_syscall_ranges.h: MIN / MAX syscall numbers
- bpf_dsl/seccomp_macros.h: seccomp macros (that probably shouldn't be macros)
BUG=449357
Review URL: https://codereview.chromium.org/890343004
Cr-Commit-Position: refs/heads/master@{#316158}
diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn
index ed4e697..92add58 100644
--- a/sandbox/linux/BUILD.gn
+++ b/sandbox/linux/BUILD.gn
@@ -155,10 +155,12 @@
"bpf_dsl/cons.h",
"bpf_dsl/dump_bpf.cc",
"bpf_dsl/dump_bpf.h",
+ "bpf_dsl/linux_syscall_ranges.h",
"bpf_dsl/policy.cc",
"bpf_dsl/policy.h",
"bpf_dsl/policy_compiler.cc",
"bpf_dsl/policy_compiler.h",
+ "bpf_dsl/seccomp_macros.h",
"bpf_dsl/syscall_set.cc",
"bpf_dsl/syscall_set.h",
"bpf_dsl/trap_registry.h",
@@ -166,7 +168,6 @@
"seccomp-bpf/die.h",
"seccomp-bpf/errorcode.cc",
"seccomp-bpf/errorcode.h",
- "seccomp-bpf/linux_seccomp.h",
"seccomp-bpf/sandbox_bpf.cc",
"seccomp-bpf/sandbox_bpf.h",
"seccomp-bpf/syscall.cc",
@@ -279,13 +280,14 @@
source_set("sandbox_services_headers") {
sources = [
- "system_headers/android_arm_ucontext.h",
"system_headers/android_arm64_ucontext.h",
+ "system_headers/android_arm_ucontext.h",
"system_headers/android_futex.h",
- "system_headers/android_ucontext.h",
"system_headers/android_i386_ucontext.h",
- "system_headers/arm_linux_syscalls.h",
+ "system_headers/android_ucontext.h",
"system_headers/arm64_linux_syscalls.h",
+ "system_headers/arm_linux_syscalls.h",
+ "system_headers/linux_seccomp.h",
"system_headers/linux_syscalls.h",
"system_headers/x86_32_linux_syscalls.h",
"system_headers/x86_64_linux_syscalls.h",