| Index: chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| index 5d3d84ac102f07b7478cc14b3797b7a3f86876ff..33ccce19e5abec6b6ae42ce5613726c12cc120f1 100644
|
| --- a/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/incident_reporting/module_integrity_verifier_win_unittest.cc
|
| @@ -364,9 +364,11 @@ TEST_F(SafeBrowsingModuleVerifierWinTest, NewVerifyModuleExportModified) {
|
| ASSERT_EQ(1U, modification_map[kTestExportName].size());
|
| uint32_t export_offset = modification_map[kTestExportName][0]->file_offset();
|
|
|
| - // Edit another exported function. VerifyModule should now report both.
|
| + // Edit another exported function. VerifyModule should now report both. Add
|
| + // one to the address so that this modification and the previous are not
|
| + // coalesced in the event that the first export is only one byte (e.g., ret).
|
| + ScopedModuleModifier<1> mod2(GetAddressOfExport(kTestDllMainExportName) + 1);
|
| state.Clear();
|
| - ScopedModuleModifier<1> mod2(GetAddressOfExport(kTestDllMainExportName));
|
| result = NewVerifyModule(kTestDllNames[0], &state);
|
| EXPECT_EQ(MODULE_STATE_MODIFIED, result.state);
|
| ASSERT_EQ(2, state.modification_size());
|
|
|