Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
index 8a6fa7204f7c599a3b8e880af1b6e8a2db9b0bf9..54db30f88808022323e76938e930c5f93aa31243 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
@@ -42,9 +42,7 @@ using sandbox::SyscallSets; |
// Make sure that seccomp-bpf does not get disabled by mistake. Also make sure |
// that we think twice about this when adding a new architecture. |
-#if !defined(ARCH_CPU_MIPS_FAMILY) |
#error "Seccomp-bpf disabled on supported architecture!" |
-#endif // !defined(ARCH_CPU_MIPS_FAMILY) |
#endif // |