| Index: sandbox/linux/sandbox_linux.gypi
|
| diff --git a/sandbox/linux/sandbox_linux.gypi b/sandbox/linux/sandbox_linux.gypi
|
| index c19bdb1c5f67b1fcbebc0b772aae0d07b0ca0eb6..039e9b405174b708ad4fc36049f0f97c6b1ddcd3 100644
|
| --- a/sandbox/linux/sandbox_linux.gypi
|
| +++ b/sandbox/linux/sandbox_linux.gypi
|
| @@ -54,7 +54,6 @@
|
| [ 'use_seccomp_bpf==1', {
|
| 'dependencies': [
|
| 'seccomp_bpf',
|
| - 'seccomp_bpf_helpers',
|
| ],
|
| }],
|
| ],
|
| @@ -141,6 +140,14 @@
|
| 'bpf_dsl/syscall_set.cc',
|
| 'bpf_dsl/syscall_set.h',
|
| 'bpf_dsl/trap_registry.h',
|
| + 'seccomp-bpf-helpers/baseline_policy.cc',
|
| + 'seccomp-bpf-helpers/baseline_policy.h',
|
| + 'seccomp-bpf-helpers/sigsys_handlers.cc',
|
| + 'seccomp-bpf-helpers/sigsys_handlers.h',
|
| + 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
|
| + 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
|
| + 'seccomp-bpf-helpers/syscall_sets.cc',
|
| + 'seccomp-bpf-helpers/syscall_sets.h',
|
| 'seccomp-bpf/die.cc',
|
| 'seccomp-bpf/die.h',
|
| 'seccomp-bpf/sandbox_bpf.cc',
|
| @@ -168,31 +175,6 @@
|
| ],
|
| },
|
| {
|
| - 'target_name': 'seccomp_bpf_helpers',
|
| - 'type': '<(component)',
|
| - 'sources': [
|
| - 'seccomp-bpf-helpers/baseline_policy.cc',
|
| - 'seccomp-bpf-helpers/baseline_policy.h',
|
| - 'seccomp-bpf-helpers/sigsys_handlers.cc',
|
| - 'seccomp-bpf-helpers/sigsys_handlers.h',
|
| - 'seccomp-bpf-helpers/syscall_parameters_restrictions.cc',
|
| - 'seccomp-bpf-helpers/syscall_parameters_restrictions.h',
|
| - 'seccomp-bpf-helpers/syscall_sets.cc',
|
| - 'seccomp-bpf-helpers/syscall_sets.h',
|
| - ],
|
| - 'dependencies': [
|
| - '../base/base.gyp:base',
|
| - 'sandbox_services',
|
| - 'seccomp_bpf',
|
| - ],
|
| - 'defines': [
|
| - 'SANDBOX_IMPLEMENTATION',
|
| - ],
|
| - 'include_dirs': [
|
| - '../..',
|
| - ],
|
| - },
|
| - {
|
| # The setuid sandbox, for Linux
|
| 'target_name': 'chrome_sandbox',
|
| 'type': 'executable',
|
|
|