| Index: sandbox/linux/seccomp-bpf/die.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/die.cc b/sandbox/linux/seccomp-bpf/die.cc
|
| index 533e2e9c353e3cc02e8cc0254a364165665b25a1..e5bc7c93847a7e5fec48d53804bddcdb0d8678d9 100644
|
| --- a/sandbox/linux/seccomp-bpf/die.cc
|
| +++ b/sandbox/linux/seccomp-bpf/die.cc
|
| @@ -22,7 +22,7 @@ void Die::ExitGroup() {
|
| // Especially, since we are dealing with system call filters. Continuing
|
| // execution would be very bad in most cases where ExitGroup() gets called.
|
| // So, we'll try a few other strategies too.
|
| - SandboxSyscall(__NR_exit_group, 1);
|
| + Syscall::Call(__NR_exit_group, 1);
|
|
|
| // We have no idea what our run-time environment looks like. So, signal
|
| // handlers might or might not do the right thing. Try to reset settings
|
| @@ -30,7 +30,7 @@ void Die::ExitGroup() {
|
| // succeeded in doing so. Nonetheless, triggering a fatal signal could help
|
| // us terminate.
|
| signal(SIGSEGV, SIG_DFL);
|
| - SandboxSyscall(__NR_prctl, PR_SET_DUMPABLE, (void*)0, (void*)0, (void*)0);
|
| + Syscall::Call(__NR_prctl, PR_SET_DUMPABLE, (void*)0, (void*)0, (void*)0);
|
| if (*(volatile char*)0) {
|
| }
|
|
|
| @@ -40,7 +40,7 @@ void Die::ExitGroup() {
|
| // We in fact retry the system call inside of our loop so that it will
|
| // stand out when somebody tries to diagnose the problem by using "strace".
|
| for (;;) {
|
| - SandboxSyscall(__NR_exit_group, 1);
|
| + Syscall::Call(__NR_exit_group, 1);
|
| }
|
| }
|
|
|
| @@ -75,7 +75,7 @@ void Die::LogToStderr(const char* msg, const char* file, int line) {
|
| // No need to loop. Short write()s are unlikely and if they happen we
|
| // probably prefer them over a loop that blocks.
|
| ignore_result(
|
| - HANDLE_EINTR(SandboxSyscall(__NR_write, 2, s.c_str(), s.length())));
|
| + HANDLE_EINTR(Syscall::Call(__NR_write, 2, s.c_str(), s.length())));
|
| }
|
| }
|
|
|
|
|