Index: sandbox/linux/seccomp-bpf/syscall.cc |
diff --git a/sandbox/linux/seccomp-bpf/syscall.cc b/sandbox/linux/seccomp-bpf/syscall.cc |
index acf207dc14c4511f91939d9077981f01732b70fd..ab125ff647e77bf72c17e7840e7449302d4541d2 100644 |
--- a/sandbox/linux/seccomp-bpf/syscall.cc |
+++ b/sandbox/linux/seccomp-bpf/syscall.cc |
@@ -143,7 +143,7 @@ namespace sandbox { |
// used as a marker that BPF code inspects. |
"cmp r0, #0\n" |
"bge 1f\n" |
- "ldr r0, =2f\n" |
+ "adr r0, 2f\n" |
"b 2f\n" |
// We declared (almost) all clobbered registers to the compiler. On |
// ARM there is no particular register pressure. So, we can go |