Index: chrome/nacl/nacl_main_platform_delegate_linux.cc |
diff --git a/chrome/nacl/nacl_main_platform_delegate_linux.cc b/chrome/nacl/nacl_main_platform_delegate_linux.cc |
index 0932c08d4509b78bd772b40ecef2efa0e972b7b4..9e3acef523518c2f69e7281e0e49e1b7201bd751 100644 |
--- a/chrome/nacl/nacl_main_platform_delegate_linux.cc |
+++ b/chrome/nacl/nacl_main_platform_delegate_linux.cc |
@@ -34,7 +34,8 @@ void NaClMainPlatformDelegate::EnableSandbox() { |
// |
// The seccomp sandbox is started in the renderer. |
// http://code.google.com/p/seccompsandbox/ |
-#if defined(ARCH_CPU_X86_FAMILY) && !defined(CHROMIUM_SELINUX) |
+#if defined(ARCH_CPU_X86_FAMILY) && !defined(CHROMIUM_SELINUX) && \ |
+ !defined(__clang__) |
// N.b. SupportsSeccompSandbox() returns a cached result, as we already |
// called it earlier in the zygote. Thus, it is OK for us to not pass in |
// a file descriptor for "/proc". |