Index: sandbox/linux/sandbox_linux.gypi |
diff --git a/sandbox/linux/sandbox_linux.gypi b/sandbox/linux/sandbox_linux.gypi |
index c19bdb1c5f67b1fcbebc0b772aae0d07b0ca0eb6..039e9b405174b708ad4fc36049f0f97c6b1ddcd3 100644 |
--- a/sandbox/linux/sandbox_linux.gypi |
+++ b/sandbox/linux/sandbox_linux.gypi |
@@ -54,7 +54,6 @@ |
[ 'use_seccomp_bpf==1', { |
'dependencies': [ |
'seccomp_bpf', |
- 'seccomp_bpf_helpers', |
], |
}], |
], |
@@ -141,6 +140,14 @@ |
'bpf_dsl/syscall_set.cc', |
'bpf_dsl/syscall_set.h', |
'bpf_dsl/trap_registry.h', |
+ 'seccomp-bpf-helpers/baseline_policy.cc', |
+ 'seccomp-bpf-helpers/baseline_policy.h', |
+ 'seccomp-bpf-helpers/sigsys_handlers.cc', |
+ 'seccomp-bpf-helpers/sigsys_handlers.h', |
+ 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', |
+ 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', |
+ 'seccomp-bpf-helpers/syscall_sets.cc', |
+ 'seccomp-bpf-helpers/syscall_sets.h', |
'seccomp-bpf/die.cc', |
'seccomp-bpf/die.h', |
'seccomp-bpf/sandbox_bpf.cc', |
@@ -168,31 +175,6 @@ |
], |
}, |
{ |
- 'target_name': 'seccomp_bpf_helpers', |
- 'type': '<(component)', |
- 'sources': [ |
- 'seccomp-bpf-helpers/baseline_policy.cc', |
- 'seccomp-bpf-helpers/baseline_policy.h', |
- 'seccomp-bpf-helpers/sigsys_handlers.cc', |
- 'seccomp-bpf-helpers/sigsys_handlers.h', |
- 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc', |
- 'seccomp-bpf-helpers/syscall_parameters_restrictions.h', |
- 'seccomp-bpf-helpers/syscall_sets.cc', |
- 'seccomp-bpf-helpers/syscall_sets.h', |
- ], |
- 'dependencies': [ |
- '../base/base.gyp:base', |
- 'sandbox_services', |
- 'seccomp_bpf', |
- ], |
- 'defines': [ |
- 'SANDBOX_IMPLEMENTATION', |
- ], |
- 'include_dirs': [ |
- '../..', |
- ], |
- }, |
- { |
# The setuid sandbox, for Linux |
'target_name': 'chrome_sandbox', |
'type': 'executable', |