| Index: sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| index ba13a3220bc34e0f883c7b854b68806e5e180355..3304e917114d10eecd15658b296a4da03bfb65e6 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc
|
| @@ -357,13 +357,6 @@ ErrorCode SyntheticPolicy(SandboxBPF*, int sysno, void*) {
|
| return ErrorCode(ENOSYS);
|
| }
|
|
|
| -// TODO(jorgelo): remove this once the new code generator lands.
|
| -#if defined(__arm__)
|
| - if (sysno > static_cast<int>(MAX_PUBLIC_SYSCALL)) {
|
| - return ErrorCode(ENOSYS);
|
| - }
|
| -#endif
|
| -
|
| if (sysno == __NR_exit_group || sysno == __NR_write) {
|
| // exit_group() is special, we really need it to work.
|
| // write() is needed for BPF_ASSERT() to report a useful error message.
|
|
|