Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
index f7e4f7b2b9bf6cf5ec7c76cd66ea638dfdf3cb1c..07acc7983bfa80d851e5fbfe68b8861bf15d0277 100644 |
--- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc |
@@ -43,9 +43,9 @@ using sandbox::SyscallSets; |
// Make sure that seccomp-bpf does not get disabled by mistake. Also make sure |
// that we think twice about this when adding a new architecture. |
-#if !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64) |
+#if !defined(ARCH_CPU_ARM64) |
#error "Seccomp-bpf disabled on supported architecture!" |
-#endif // !defined(ARCH_CPU_MIPS_FAMILY) && !defined(ARCH_CPU_ARM64) |
+#endif // !defined(ARCH_CPU_ARM64) |
#endif // |