Index: chrome_elf/blacklist/blacklist_interceptions.cc |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.cc b/chrome_elf/blacklist/blacklist_interceptions.cc |
index 28eb692accc25ef431ecb8c013fbb40dbca71129..465f0175c75d22d37c87456253dd10aa8c90aa43 100644 |
--- a/chrome_elf/blacklist/blacklist_interceptions.cc |
+++ b/chrome_elf/blacklist/blacklist_interceptions.cc |
@@ -51,7 +51,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { |
DCHECK_NT(g_nt_query_virtual_memory_func); |
// We'll start with something close to max_path characters for the name. |
- ULONG buffer_bytes = MAX_PATH * 2; |
+ SIZE_T buffer_bytes = MAX_PATH * 2; |
std::vector<BYTE> buffer_data(buffer_bytes); |
for (;;) { |
@@ -61,7 +61,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { |
if (!section_name) |
break; |
- ULONG returned_bytes; |
+ SIZE_T returned_bytes; |
NTSTATUS ret = g_nt_query_virtual_memory_func( |
NtCurrentProcess, address, MemorySectionName, section_name, |
buffer_bytes, &returned_bytes); |
@@ -95,7 +95,7 @@ bool IsModuleValidImageSection(HANDLE section, |
return false; |
SECTION_BASIC_INFORMATION basic_info; |
- SIZE_T bytes_returned; |
+ ULONG bytes_returned; |
NTSTATUS ret = g_nt_query_section_func(section, SectionBasicInformation, |
&basic_info, sizeof(basic_info), |
&bytes_returned); |