| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| index 820b18b8419bd33ab0ce4e401e12cd66200638ed..f7e4f7b2b9bf6cf5ec7c76cd66ea638dfdf3cb1c 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| @@ -26,6 +26,7 @@
|
| #include "content/common/sandbox_linux/bpf_gpu_policy_linux.h"
|
| #include "content/common/sandbox_linux/bpf_ppapi_policy_linux.h"
|
| #include "content/common/sandbox_linux/bpf_renderer_policy_linux.h"
|
| +#include "content/common/sandbox_linux/bpf_utility_policy_linux.h"
|
| #include "content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h"
|
| #include "content/common/sandbox_linux/sandbox_linux.h"
|
| #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
|
| @@ -194,7 +195,7 @@ bool StartBPFSandbox(const CommandLine& command_line,
|
| } else if (process_type == switches::kPpapiPluginProcess) {
|
| policy.reset(new PpapiProcessPolicy);
|
| } else if (process_type == switches::kUtilityProcess) {
|
| - policy.reset(new BlacklistDebugAndNumaPolicy);
|
| + policy.reset(new UtilityProcessPolicy);
|
| } else {
|
| NOTREACHED();
|
| policy.reset(new AllowAllPolicy);
|
|
|