Index: sandbox/linux/seccomp/syscall.cc |
diff --git a/sandbox/linux/seccomp/syscall.cc b/sandbox/linux/seccomp/syscall.cc |
index b25146b380c0bd1ee6cc134fbc9cf78013799f6e..8b14b302a4abc0a933621239ad186c715095d0ab 100644 |
--- a/sandbox/linux/seccomp/syscall.cc |
+++ b/sandbox/linux/seccomp/syscall.cc |
@@ -203,7 +203,7 @@ void* Sandbox::defaultSystemCallHandler(int syscallNum, void* arg0, void* arg1, |
// the exact instruction sequence in libc, we might not be able to reliably |
// filter out these system calls at the time when we instrument the code. |
SysCalls sys; |
- unsigned long rc; |
+ long rc; |
switch (syscallNum) { |
case __NR_read: |
Debug::syscall(syscallNum, "Allowing unrestricted system call"); |