| Index: sandbox/linux/seccomp-bpf/trap.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/trap.cc b/sandbox/linux/seccomp-bpf/trap.cc
|
| index f8b64c991b0f591c4d82bbb196e22acba7e96ece..4c42111c2b07659f5c7ed9358655e30d07c952cd 100644
|
| --- a/sandbox/linux/seccomp-bpf/trap.cc
|
| +++ b/sandbox/linux/seccomp-bpf/trap.cc
|
| @@ -168,13 +168,13 @@ void Trap::SigSys(int nr, siginfo_t* info, void* void_context) {
|
| if (sigsys.nr == __NR_clone) {
|
| RAW_SANDBOX_DIE("Cannot call clone() from an UnsafeTrap() handler.");
|
| }
|
| - rc = SandboxSyscall(sigsys.nr,
|
| - SECCOMP_PARM1(ctx),
|
| - SECCOMP_PARM2(ctx),
|
| - SECCOMP_PARM3(ctx),
|
| - SECCOMP_PARM4(ctx),
|
| - SECCOMP_PARM5(ctx),
|
| - SECCOMP_PARM6(ctx));
|
| + rc = Syscall::Call(sigsys.nr,
|
| + SECCOMP_PARM1(ctx),
|
| + SECCOMP_PARM2(ctx),
|
| + SECCOMP_PARM3(ctx),
|
| + SECCOMP_PARM4(ctx),
|
| + SECCOMP_PARM5(ctx),
|
| + SECCOMP_PARM6(ctx));
|
| } else {
|
| const ErrorCode& err = trap_array_[info->si_errno - 1];
|
| if (!err.safe_) {
|
| @@ -227,7 +227,7 @@ ErrorCode Trap::MakeTrapImpl(TrapFnc fnc, const void* aux, bool safe) {
|
| // we never return an ErrorCode that is marked as "unsafe". This also
|
| // means, the BPF compiler will never emit code that allow unsafe system
|
| // calls to by-pass the filter (because they use the magic return address
|
| - // from SandboxSyscall(-1)).
|
| + // from Syscall::Call(-1)).
|
|
|
| // This SANDBOX_DIE() can optionally be removed. It won't break security,
|
| // but it might make error messages from the BPF compiler a little harder
|
|
|