From 266720b3da80e4be6b5feef669d0108fea5eded1 Mon Sep 17 00:00:00 2001 From: rnk Date: Wed, 25 Feb 2015 16:40:54 -0800 Subject: Reland the ULONG -> SIZE_T change from 317177 Testing shows that this change is correct, but there was no evidence supporting the other change. Will manually run the x64 dbg test try bot for this change. TBR=thakis@chromium.org,jvoung@chromium.org BUG=458690,460563 Review URL: https://codereview.chromium.org/942003008 Cr-Commit-Position: refs/heads/master@{#318160} --- chrome_elf/blacklist/blacklist_interceptions.cc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'chrome_elf') diff --git a/chrome_elf/blacklist/blacklist_interceptions.cc b/chrome_elf/blacklist/blacklist_interceptions.cc index 28eb692..07825ec 100644 --- a/chrome_elf/blacklist/blacklist_interceptions.cc +++ b/chrome_elf/blacklist/blacklist_interceptions.cc @@ -51,7 +51,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { DCHECK_NT(g_nt_query_virtual_memory_func); // We'll start with something close to max_path characters for the name. - ULONG buffer_bytes = MAX_PATH * 2; + SIZE_T buffer_bytes = MAX_PATH * 2; std::vector buffer_data(buffer_bytes); for (;;) { @@ -61,7 +61,7 @@ base::string16 GetBackingModuleFilePath(PVOID address) { if (!section_name) break; - ULONG returned_bytes; + SIZE_T returned_bytes; NTSTATUS ret = g_nt_query_virtual_memory_func( NtCurrentProcess, address, MemorySectionName, section_name, buffer_bytes, &returned_bytes); -- cgit v1.1