| Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| index 6b42d9bb28e0af2ef94efca42bd6a8e4365dd69d..2bf572c0b3cd84d640db6abbcb7dcadb511060e4 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| @@ -231,7 +231,7 @@ ResultExpr EvaluateSyscallImpl(int fs_denied_errno,
|
| return RestrictSocketcallCommand();
|
| #endif
|
|
|
| -#if defined(__x86_64__)
|
| +#if !defined(__i386__)
|
| if (sysno == __NR_getsockopt || sysno ==__NR_setsockopt) {
|
| // Used by Mojo EDK to catch a message pipe being sent over itself.
|
| const Arg<int> level(1);
|
|
|