| Index: chrome/renderer/renderer_main_platform_delegate_linux.cc
|
| diff --git a/chrome/renderer/renderer_main_platform_delegate_linux.cc b/chrome/renderer/renderer_main_platform_delegate_linux.cc
|
| index a965edef8b8c43376a16a25b527c3e8e3bcde193..ad433306cc0fef9f51f5476986ee66459a6ee581 100644
|
| --- a/chrome/renderer/renderer_main_platform_delegate_linux.cc
|
| +++ b/chrome/renderer/renderer_main_platform_delegate_linux.cc
|
| @@ -36,7 +36,8 @@ bool RendererMainPlatformDelegate::EnableSandbox() {
|
| //
|
| // The seccomp sandbox is started in the renderer.
|
| // http://code.google.com/p/seccompsandbox/
|
| -#if defined(ARCH_CPU_X86_FAMILY) && !defined(CHROMIUM_SELINUX)
|
| +#if defined(ARCH_CPU_X86_FAMILY) && !defined(CHROMIUM_SELINUX) && \
|
| + !defined(__clang__)
|
| // N.b. SupportsSeccompSandbox() returns a cached result, as we already
|
| // called it earlier in the zygote. Thus, it is OK for us to not pass in
|
| // a file descriptor for "/proc".
|
|
|