Index: components/nacl/loader/nonsfi/nonsfi_sandbox.cc |
diff --git a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc |
index ee5e6d517815408cff31416a531eb4baf079da96..9a148275c53a282e984b1dcf4bbfbab55861785b 100644 |
--- a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc |
+++ b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc |
@@ -23,7 +23,6 @@ |
#include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
#include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" |
#include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" |
-#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
#include "sandbox/linux/services/linux_syscalls.h" |
#if defined(__arm__) && !defined(MAP_STACK) |
@@ -304,7 +303,7 @@ ResultExpr NaClNonSfiBPFSandboxPolicy::InvalidSyscall() const { |
bool InitializeBPFSandbox() { |
bool sandbox_is_initialized = content::InitializeSandbox( |
- scoped_ptr<sandbox::SandboxBPFPolicy>( |
+ scoped_ptr<sandbox::bpf_dsl::SandboxBPFDSLPolicy>( |
new nacl::nonsfi::NaClNonSfiBPFSandboxPolicy())); |
if (!sandbox_is_initialized) |
return false; |