| Index: content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| diff --git a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| index 481ab39b268af043ac28b539b23d19973a986680..be6a91c6c6791819910d2e2a63068fa6a4b78c4b 100644
|
| --- a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| +++ b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| @@ -40,6 +40,7 @@ namespace content {
|
|
|
| namespace {
|
|
|
| +#if !defined(__i386__)
|
| // Restricts the arguments to sys_socket() to AF_UNIX. Returns a BoolExpr that
|
| // evaluates to true if the syscall should be allowed.
|
| BoolExpr RestrictSocketArguments(const Arg<int>& domain,
|
| @@ -51,6 +52,7 @@ BoolExpr RestrictSocketArguments(const Arg<int>& domain,
|
| (type & ~kSockFlags) == SOCK_STREAM),
|
| protocol == 0);
|
| }
|
| +#endif // !defined(__i386__)
|
|
|
| } // namespace
|
|
|
|
|