| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| index 8a6fa7204f7c599a3b8e880af1b6e8a2db9b0bf9..54db30f88808022323e76938e930c5f93aa31243 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| @@ -42,9 +42,7 @@ using sandbox::SyscallSets;
|
|
|
| // Make sure that seccomp-bpf does not get disabled by mistake. Also make sure
|
| // that we think twice about this when adding a new architecture.
|
| -#if !defined(ARCH_CPU_MIPS_FAMILY)
|
| #error "Seccomp-bpf disabled on supported architecture!"
|
| -#endif // !defined(ARCH_CPU_MIPS_FAMILY)
|
|
|
| #endif //
|
|
|
|
|