| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| index f7e4f7b2b9bf6cf5ec7c76cd66ea638dfdf3cb1c..07acc7983bfa80d851e5fbfe68b8861bf15d0277 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| @@ -43,9 +43,9 @@ using sandbox::SyscallSets;
|
|
|
| // Make sure that seccomp-bpf does not get disabled by mistake. Also make sure
|
| // that we think twice about this when adding a new architecture.
|
| -#if !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64)
|
| +#if !defined(ARCH_CPU_ARM64)
|
| #error "Seccomp-bpf disabled on supported architecture!"
|
| -#endif // !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64)
|
| +#endif // !defined(ARCH_CPU_ARM64)
|
|
|
| #endif //
|
|
|
|
|