| Index: sandbox/linux/seccomp-bpf/sandbox_bpf.cc | 
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc | 
| index c5c6f61c904fe31523f1802cc2a3d9d5fc87e772..6ecbca99a5f3c771a7dbeb8a0dd6050932536938 100644 | 
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc | 
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc | 
| @@ -613,7 +613,7 @@ SandboxBPF::Program* SandboxBPF::AssembleFilter(bool force_verification) { | 
| // and of course, we make sure to only ever enable this feature if it | 
| // is actually requested by the sandbox policy. | 
| if (has_unsafe_traps) { | 
| -      if (SandboxSyscall(-1) == -1 && errno == ENOSYS) { | 
| +      if (Syscall::Call(-1) == -1 && errno == ENOSYS) { | 
| SANDBOX_DIE( | 
| "Support for UnsafeTrap() has not yet been ported to this " | 
| "architecture"); | 
| @@ -650,9 +650,8 @@ SandboxBPF::Program* SandboxBPF::AssembleFilter(bool force_verification) { | 
| gen->Traverse(jumptable, RedirectToUserspace, this); | 
|  | 
| // Allow system calls, if they originate from our magic return address | 
| -      // (which we can query by calling SandboxSyscall(-1)). | 
| -      uintptr_t syscall_entry_point = | 
| -          static_cast<uintptr_t>(SandboxSyscall(-1)); | 
| +      // (which we can query by calling Syscall::Call(-1)). | 
| +      uintptr_t syscall_entry_point = static_cast<uintptr_t>(Syscall::Call(-1)); | 
| uint32_t low = static_cast<uint32_t>(syscall_entry_point); | 
| #if __SIZEOF_POINTER__ > 4 | 
| uint32_t hi = static_cast<uint32_t>(syscall_entry_point >> 32); | 
| @@ -1003,13 +1002,13 @@ ErrorCode SandboxBPF::UnsafeTrap(Trap::TrapFnc fnc, const void* aux) { | 
| } | 
|  | 
| intptr_t SandboxBPF::ForwardSyscall(const struct arch_seccomp_data& args) { | 
| -  return SandboxSyscall(args.nr, | 
| -                        static_cast<intptr_t>(args.args[0]), | 
| -                        static_cast<intptr_t>(args.args[1]), | 
| -                        static_cast<intptr_t>(args.args[2]), | 
| -                        static_cast<intptr_t>(args.args[3]), | 
| -                        static_cast<intptr_t>(args.args[4]), | 
| -                        static_cast<intptr_t>(args.args[5])); | 
| +  return Syscall::Call(args.nr, | 
| +                       static_cast<intptr_t>(args.args[0]), | 
| +                       static_cast<intptr_t>(args.args[1]), | 
| +                       static_cast<intptr_t>(args.args[2]), | 
| +                       static_cast<intptr_t>(args.args[3]), | 
| +                       static_cast<intptr_t>(args.args[4]), | 
| +                       static_cast<intptr_t>(args.args[5])); | 
| } | 
|  | 
| ErrorCode SandboxBPF::Cond(int argno, | 
|  |