$OpenBSD: patch-sandbox_linux_BUILD_gn,v 1.4 2018/05/04 07:14:58 robert Exp $
Index: sandbox/linux/BUILD.gn
--- sandbox/linux/BUILD.gn.orig
+++ sandbox/linux/BUILD.gn
@@ -12,12 +12,12 @@ if (is_android) {
 }
 
 declare_args() {
-  compile_suid_client = is_linux
+  compile_suid_client = is_linux && !is_openbsd
 
-  compile_credentials = is_linux
+  compile_credentials = is_linux && !is_openbsd
 
   # On Android, use plain GTest.
-  use_base_test_suite = is_linux
+  use_base_test_suite = is_linux && !is_openbsd
 }
 
 if (is_nacl_nonsfi) {
@@ -397,7 +397,7 @@ component("sandbox_services") {
     public_deps += [ ":sandbox_services_headers" ]
   }
 
-  if (is_nacl_nonsfi) {
+  if (is_nacl_nonsfi || is_openbsd) {
     cflags = [ "-fgnu-inline-asm" ]
 
     sources -= [
@@ -405,6 +405,8 @@ component("sandbox_services") {
       "services/init_process_reaper.h",
       "services/scoped_process.cc",
       "services/scoped_process.h",
+      "services/syscall_wrappers.cc",
+      "services/syscall_wrappers.h",
       "services/yama.cc",
       "services/yama.h",
       "syscall_broker/broker_channel.cc",
@@ -421,6 +423,10 @@ component("sandbox_services") {
       "syscall_broker/broker_permission_list.h",
       "syscall_broker/broker_process.cc",
       "syscall_broker/broker_process.h",
+    ]
+    sources += [
+      "services/libc_interceptor.cc",
+      "services/libc_interceptor.h",
     ]
   } else if (!is_android) {
     sources += [
