| Index: components/nacl/loader/nonsfi/nonsfi_sandbox.cc
|
| diff --git a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
|
| index ee5e6d517815408cff31416a531eb4baf079da96..9a148275c53a282e984b1dcf4bbfbab55861785b 100644
|
| --- a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
|
| +++ b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
|
| @@ -23,7 +23,6 @@
|
| #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
|
| #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
|
| #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
|
| -#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
|
| #include "sandbox/linux/services/linux_syscalls.h"
|
|
|
| #if defined(__arm__) && !defined(MAP_STACK)
|
| @@ -304,7 +303,7 @@ ResultExpr NaClNonSfiBPFSandboxPolicy::InvalidSyscall() const {
|
|
|
| bool InitializeBPFSandbox() {
|
| bool sandbox_is_initialized = content::InitializeSandbox(
|
| - scoped_ptr<sandbox::SandboxBPFPolicy>(
|
| + scoped_ptr<sandbox::bpf_dsl::SandboxBPFDSLPolicy>(
|
| new nacl::nonsfi::NaClNonSfiBPFSandboxPolicy()));
|
| if (!sandbox_is_initialized)
|
| return false;
|
|
|