Index: sandbox/linux/seccomp-bpf/trap.cc |
diff --git a/sandbox/linux/seccomp-bpf/trap.cc b/sandbox/linux/seccomp-bpf/trap.cc |
index 3c30de35546d89768d79ddb490cfba7635aa6409..bd00d9c1f1d70afc226e85a4b3430a39cb510e26 100644 |
--- a/sandbox/linux/seccomp-bpf/trap.cc |
+++ b/sandbox/linux/seccomp-bpf/trap.cc |
@@ -104,8 +104,8 @@ Trap *Trap::GetInstance() { |
void Trap::SigSysAction(int nr, siginfo_t *info, void *void_context) { |
if (!global_trap_) { |
- SANDBOX_DIE("This can't happen. Found no global singleton instance " |
- "for Trap() handling."); |
+ RAW_SANDBOX_DIE("This can't happen. Found no global singleton instance " |
+ "for Trap() handling."); |
} |
global_trap_->SigSys(nr, info, void_context); |
} |
@@ -148,14 +148,14 @@ void Trap::SigSys(int nr, siginfo_t *info, void *void_context) { |
// safe and can lead to bugs. We should eventually implement a different |
// logging and reporting mechanism that is safe to be called from |
// the sigSys() handler. |
- SANDBOX_DIE("Sanity checks are failing after receiving SIGSYS."); |
+ RAW_SANDBOX_DIE("Sanity checks are failing after receiving SIGSYS."); |
} |
intptr_t rc; |
if (has_unsafe_traps_ && GetIsInSigHandler(ctx)) { |
errno = old_errno; |
if (sigsys.nr == __NR_clone) { |
- SANDBOX_DIE("Cannot call clone() from an UnsafeTrap() handler."); |
+ RAW_SANDBOX_DIE("Cannot call clone() from an UnsafeTrap() handler."); |
} |
rc = SandboxSyscall(sigsys.nr, |
SECCOMP_PARM1(ctx), SECCOMP_PARM2(ctx), |