summaryrefslogtreecommitdiffstats
path: root/chrome/renderer
diff options
context:
space:
mode:
authordeanm@chromium.org <deanm@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-21 18:16:20 +0000
committerdeanm@chromium.org <deanm@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-08-21 18:16:20 +0000
commit38b1503bd0d90f090744bd0a875a7d6975401aff (patch)
tree153d07b644c86b9919111a1d2d42cfa81bea71d1 /chrome/renderer
parent3bb1cd99625369d3aed8bc45215abb80fdab54cd (diff)
downloadchromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.zip
chromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.tar.gz
chromium_src-38b1503bd0d90f090744bd0a875a7d6975401aff.tar.bz2
Hide seccomp sandbox from !X86
This CL moves the seccomp sandbox callsite behind an ifdef arch x86 and makes the gyp target conditional on !ARM. Patch by Joel Stanley <joel@jms.id.au> BUG=19953 Review URL: http://codereview.chromium.org/173201 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@23984 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/renderer')
-rw-r--r--chrome/renderer/renderer_main_platform_delegate_linux.cc2
1 files changed, 2 insertions, 0 deletions
diff --git a/chrome/renderer/renderer_main_platform_delegate_linux.cc b/chrome/renderer/renderer_main_platform_delegate_linux.cc
index 5e8555d..d93f1a5 100644
--- a/chrome/renderer/renderer_main_platform_delegate_linux.cc
+++ b/chrome/renderer/renderer_main_platform_delegate_linux.cc
@@ -36,10 +36,12 @@ bool RendererMainPlatformDelegate::EnableSandbox() {
//
// The seccomp sandbox is started in the renderer.
// http://code.google.com/p/seccompsandbox/
+#if defined(ARCH_CPU_X86_FAMILY)
if (CommandLine::ForCurrentProcess()->HasSwitch(
switches::kEnableSeccompSandbox)) {
StartSeccompSandbox();
}
+#endif
return true;
}