| Index: sandbox/sandbox_nacl_nonsfi.gyp
|
| diff --git a/sandbox/sandbox_nacl_nonsfi.gyp b/sandbox/sandbox_nacl_nonsfi.gyp
|
| index c55b124b7d0ef91fa06fc3a94be0835310220202..f99c15eda3f79ffd92ecf376ae5689daf6d25f90 100644
|
| --- a/sandbox/sandbox_nacl_nonsfi.gyp
|
| +++ b/sandbox/sandbox_nacl_nonsfi.gyp
|
| @@ -30,8 +30,24 @@
|
| 'linux/services/proc_util.cc',
|
| 'linux/services/thread_helpers.cc',
|
| 'linux/suid/client/setuid_sandbox_client.cc',
|
| - # TODO(hidehiko): Support namespace sandbox and seccomp-bpf
|
| - # sandbox.
|
| +
|
| + 'linux/bpf_dsl/bpf_dsl.cc',
|
| + 'linux/bpf_dsl/codegen.cc',
|
| + 'linux/bpf_dsl/dump_bpf.cc',
|
| + 'linux/bpf_dsl/policy.cc',
|
| + 'linux/bpf_dsl/policy_compiler.cc',
|
| + 'linux/bpf_dsl/syscall_set.cc',
|
| + 'linux/bpf_dsl/verifier.cc',
|
| + 'linux/seccomp-bpf-helpers/sigsys_handlers.cc',
|
| + 'linux/seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
|
| + 'linux/seccomp-bpf/die.cc',
|
| + 'linux/seccomp-bpf/errorcode.cc',
|
| + 'linux/seccomp-bpf/sandbox_bpf.cc',
|
| + 'linux/seccomp-bpf/syscall.cc',
|
| + 'linux/seccomp-bpf/trap.cc',
|
| + 'linux/services/resource_limits.cc',
|
| + 'linux/services/syscall_wrappers.cc',
|
| + # TODO(hidehiko): Support namespace sandbox.
|
| ],
|
| },
|
| 'dependencies': [
|
|
|