| Index: sandbox/linux/BUILD.gn
|
| diff --git a/sandbox/linux/BUILD.gn b/sandbox/linux/BUILD.gn
|
| index e734324e268651d4a638227c7871deef3f8606b5..b161da82c9c1c345c23776428141015190f10499 100644
|
| --- a/sandbox/linux/BUILD.gn
|
| +++ b/sandbox/linux/BUILD.gn
|
| @@ -411,3 +411,32 @@ if (is_android) {
|
| # 'includes': [ '../../build/apk_test.gypi' ],
|
| # }
|
| }
|
| +
|
| +if (enable_nacl) {
|
| + source_set("sandbox_linux_nacl_nonsfi") {
|
| + cflags = [ "-fgnu-inline-asm" ]
|
| + sources = [
|
| + # this is the subset of linux build target, needed for
|
| + # nacl_helper_nonsfi's sandbox implementation.
|
| + "bpf_dsl/bpf_dsl.cc",
|
| + "bpf_dsl/codegen.cc",
|
| + "bpf_dsl/policy.cc",
|
| + "bpf_dsl/policy_compiler.cc",
|
| + "bpf_dsl/syscall_set.cc",
|
| + "seccomp-bpf-helpers/sigsys_handlers.cc",
|
| + "seccomp-bpf-helpers/syscall_parameters_restrictions.cc",
|
| + "seccomp-bpf/die.cc",
|
| + "seccomp-bpf/sandbox_bpf.cc",
|
| + "seccomp-bpf/syscall.cc",
|
| + "seccomp-bpf/trap.cc",
|
| + "services/credentials.cc",
|
| + "services/namespace_sandbox.cc",
|
| + "services/namespace_utils.cc",
|
| + "services/proc_util.cc",
|
| + "services/resource_limits.cc",
|
| + "services/syscall_wrappers.cc",
|
| + "services/thread_helpers.cc",
|
| + "suid/client/setuid_sandbox_client.cc",
|
| + ]
|
| + }
|
| +}
|
|
|