| Index: sandbox/linux/seccomp-bpf/trap.cc | 
| diff --git a/sandbox/linux/seccomp-bpf/trap.cc b/sandbox/linux/seccomp-bpf/trap.cc | 
| index f8b64c991b0f591c4d82bbb196e22acba7e96ece..4c42111c2b07659f5c7ed9358655e30d07c952cd 100644 | 
| --- a/sandbox/linux/seccomp-bpf/trap.cc | 
| +++ b/sandbox/linux/seccomp-bpf/trap.cc | 
| @@ -168,13 +168,13 @@ void Trap::SigSys(int nr, siginfo_t* info, void* void_context) { | 
| if (sigsys.nr == __NR_clone) { | 
| RAW_SANDBOX_DIE("Cannot call clone() from an UnsafeTrap() handler."); | 
| } | 
| -    rc = SandboxSyscall(sigsys.nr, | 
| -                        SECCOMP_PARM1(ctx), | 
| -                        SECCOMP_PARM2(ctx), | 
| -                        SECCOMP_PARM3(ctx), | 
| -                        SECCOMP_PARM4(ctx), | 
| -                        SECCOMP_PARM5(ctx), | 
| -                        SECCOMP_PARM6(ctx)); | 
| +    rc = Syscall::Call(sigsys.nr, | 
| +                       SECCOMP_PARM1(ctx), | 
| +                       SECCOMP_PARM2(ctx), | 
| +                       SECCOMP_PARM3(ctx), | 
| +                       SECCOMP_PARM4(ctx), | 
| +                       SECCOMP_PARM5(ctx), | 
| +                       SECCOMP_PARM6(ctx)); | 
| } else { | 
| const ErrorCode& err = trap_array_[info->si_errno - 1]; | 
| if (!err.safe_) { | 
| @@ -227,7 +227,7 @@ ErrorCode Trap::MakeTrapImpl(TrapFnc fnc, const void* aux, bool safe) { | 
| // we never return an ErrorCode that is marked as "unsafe". This also | 
| // means, the BPF compiler will never emit code that allow unsafe system | 
| // calls to by-pass the filter (because they use the magic return address | 
| -    // from SandboxSyscall(-1)). | 
| +    // from Syscall::Call(-1)). | 
|  | 
| // This SANDBOX_DIE() can optionally be removed. It won't break security, | 
| // but it might make error messages from the BPF compiler a little harder | 
|  |