| Index: chrome_elf/blacklist/blacklist_interceptions.cc
|
| diff --git a/chrome_elf/blacklist/blacklist_interceptions.cc b/chrome_elf/blacklist/blacklist_interceptions.cc
|
| index 28eb692accc25ef431ecb8c013fbb40dbca71129..465f0175c75d22d37c87456253dd10aa8c90aa43 100644
|
| --- a/chrome_elf/blacklist/blacklist_interceptions.cc
|
| +++ b/chrome_elf/blacklist/blacklist_interceptions.cc
|
| @@ -51,7 +51,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) {
|
| DCHECK_NT(g_nt_query_virtual_memory_func);
|
|
|
| // We'll start with something close to max_path characters for the name.
|
| - ULONG buffer_bytes = MAX_PATH * 2;
|
| + SIZE_T buffer_bytes = MAX_PATH * 2;
|
| std::vector<BYTE> buffer_data(buffer_bytes);
|
|
|
| for (;;) {
|
| @@ -61,7 +61,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) {
|
| if (!section_name)
|
| break;
|
|
|
| - ULONG returned_bytes;
|
| + SIZE_T returned_bytes;
|
| NTSTATUS ret = g_nt_query_virtual_memory_func(
|
| NtCurrentProcess, address, MemorySectionName, section_name,
|
| buffer_bytes, &returned_bytes);
|
| @@ -95,7 +95,7 @@ bool IsModuleValidImageSection(HANDLE section,
|
| return false;
|
|
|
| SECTION_BASIC_INFORMATION basic_info;
|
| - SIZE_T bytes_returned;
|
| + ULONG bytes_returned;
|
| NTSTATUS ret = g_nt_query_section_func(section, SectionBasicInformation,
|
| &basic_info, sizeof(basic_info),
|
| &bytes_returned);
|
|
|