| Index: sandbox/linux/seccomp-bpf/syscall.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/syscall.cc b/sandbox/linux/seccomp-bpf/syscall.cc
|
| index acf207dc14c4511f91939d9077981f01732b70fd..ab125ff647e77bf72c17e7840e7449302d4541d2 100644
|
| --- a/sandbox/linux/seccomp-bpf/syscall.cc
|
| +++ b/sandbox/linux/seccomp-bpf/syscall.cc
|
| @@ -143,7 +143,7 @@ namespace sandbox {
|
| // used as a marker that BPF code inspects.
|
| "cmp r0, #0\n"
|
| "bge 1f\n"
|
| - "ldr r0, =2f\n"
|
| + "adr r0, 2f\n"
|
| "b 2f\n"
|
| // We declared (almost) all clobbered registers to the compiler. On
|
| // ARM there is no particular register pressure. So, we can go
|
|
|