Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
index 820b18b8419bd33ab0ce4e401e12cd66200638ed..6a868ab78fbc8e938e1a75db805b438b003cfd0c 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
@@ -42,9 +42,9 @@ using sandbox::SyscallSets; |
// Make sure that seccomp-bpf does not get disabled by mistake. Also make sure |
// that we think twice about this when adding a new architecture. |
-#if !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64) |
+#if !defined(ARCH_CPU_ARM64) |
#error "Seccomp-bpf disabled on supported architecture!" |
-#endif // !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64) |
+#endif // !defined(ARCH_CPU_ARM64) |
#endif // |