Index: sandbox/sandbox_nacl_nonsfi.gyp |
diff --git a/sandbox/sandbox_nacl_nonsfi.gyp b/sandbox/sandbox_nacl_nonsfi.gyp |
index c55b124b7d0ef91fa06fc3a94be0835310220202..f99c15eda3f79ffd92ecf376ae5689daf6d25f90 100644 |
--- a/sandbox/sandbox_nacl_nonsfi.gyp |
+++ b/sandbox/sandbox_nacl_nonsfi.gyp |
@@ -30,8 +30,24 @@ |
'linux/services/proc_util.cc', |
'linux/services/thread_helpers.cc', |
'linux/suid/client/setuid_sandbox_client.cc', |
- # TODO(hidehiko): Support namespace sandbox and seccomp-bpf |
- # sandbox. |
+ |
+ 'linux/bpf_dsl/bpf_dsl.cc', |
+ 'linux/bpf_dsl/codegen.cc', |
+ 'linux/bpf_dsl/dump_bpf.cc', |
+ 'linux/bpf_dsl/policy.cc', |
+ 'linux/bpf_dsl/policy_compiler.cc', |
+ 'linux/bpf_dsl/syscall_set.cc', |
+ 'linux/bpf_dsl/verifier.cc', |
+ 'linux/seccomp-bpf-helpers/sigsys_handlers.cc', |
+ 'linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc', |
+ 'linux/seccomp-bpf/die.cc', |
+ 'linux/seccomp-bpf/errorcode.cc', |
+ 'linux/seccomp-bpf/sandbox_bpf.cc', |
+ 'linux/seccomp-bpf/syscall.cc', |
+ 'linux/seccomp-bpf/trap.cc', |
+ 'linux/services/resource_limits.cc', |
+ 'linux/services/syscall_wrappers.cc', |
+ # TODO(hidehiko): Support namespace sandbox. |
], |
}, |
'dependencies': [ |