Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc |
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc |
index 6b42d9bb28e0af2ef94efca42bd6a8e4365dd69d..2bf572c0b3cd84d640db6abbcb7dcadb511060e4 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc |
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc |
@@ -231,7 +231,7 @@ ResultExpr EvaluateSyscallImpl(int fs_denied_errno, |
return RestrictSocketcallCommand(); |
#endif |
-#if defined(__x86_64__) |
+#if !defined(__i386__) |
if (sysno == __NR_getsockopt || sysno ==__NR_setsockopt) { |
// Used by Mojo EDK to catch a message pipe being sent over itself. |
const Arg<int> level(1); |