Index: sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
index ba13a3220bc34e0f883c7b854b68806e5e180355..3304e917114d10eecd15658b296a4da03bfb65e6 100644 |
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf_unittest.cc |
@@ -357,13 +357,6 @@ ErrorCode SyntheticPolicy(SandboxBPF*, int sysno, void*) { |
return ErrorCode(ENOSYS); |
} |
-// TODO(jorgelo): remove this once the new code generator lands. |
-#if defined(__arm__) |
- if (sysno > static_cast<int>(MAX_PUBLIC_SYSCALL)) { |
- return ErrorCode(ENOSYS); |
- } |
-#endif |
- |
if (sysno == __NR_exit_group || sysno == __NR_write) { |
// exit_group() is special, we really need it to work. |
// write() is needed for BPF_ASSERT() to report a useful error message. |