Index: chrome_elf/blacklist/blacklist_interceptions.cc |
diff --git a/chrome_elf/blacklist/blacklist_interceptions.cc b/chrome_elf/blacklist/blacklist_interceptions.cc |
index 28eb692accc25ef431ecb8c013fbb40dbca71129..07825ecc51d3267ef4caf3b74196893576548c1f 100644 |
--- a/chrome_elf/blacklist/blacklist_interceptions.cc |
+++ b/chrome_elf/blacklist/blacklist_interceptions.cc |
@@ -51,7 +51,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { |
DCHECK_NT(g_nt_query_virtual_memory_func); |
// We'll start with something close to max_path characters for the name. |
- ULONG buffer_bytes = MAX_PATH * 2; |
+ SIZE_T buffer_bytes = MAX_PATH * 2; |
std::vector<BYTE> buffer_data(buffer_bytes); |
for (;;) { |
@@ -61,7 +61,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { |
if (!section_name) |
break; |
- ULONG returned_bytes; |
+ SIZE_T returned_bytes; |
NTSTATUS ret = g_nt_query_virtual_memory_func( |
NtCurrentProcess, address, MemorySectionName, section_name, |
buffer_bytes, &returned_bytes); |