| Index: chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc
|
| diff --git a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc
|
| index b15549ecf4722e48abffcdcb3c5fa92d10d0a9ea..8e2ce06586eb26c46acd5c6960391fe5836d9848 100644
|
| --- a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc
|
| +++ b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc
|
| @@ -42,7 +42,7 @@ TEST(BlacklistLoadAnalyzer, TestBlacklistBypass) {
|
| // Check that the test dll appears in list.
|
| module_names.clear();
|
| EXPECT_TRUE(GetLoadedBlacklistedModules(&module_names));
|
| - ASSERT_EQ(1, module_names.size());
|
| + ASSERT_EQ(1u, module_names.size());
|
| EXPECT_STREQ(kTestDllName,
|
| base::ToLowerASCII(
|
| base::FilePath(module_names[0]).BaseName().value()).c_str());
|
|
|