Index: ipc/ipc_fuzzing_tests.cc |
diff --git a/ipc/ipc_fuzzing_tests.cc b/ipc/ipc_fuzzing_tests.cc |
index 07ff8d9f886dd4cb15e4ace5c72f4b3d67bf3f2c..3d2d497c5f89cb99b814598f0d968cbf66eba724 100644 |
--- a/ipc/ipc_fuzzing_tests.cc |
+++ b/ipc/ipc_fuzzing_tests.cc |
@@ -38,7 +38,7 @@ TEST(IPCMessageIntegrity, ReadBeyondBufferStr) { |
//This was BUG 984408. |
uint32 v1 = kuint32max - 1; |
int v2 = 666; |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(v1)); |
EXPECT_TRUE(m.WriteInt(v2)); |
@@ -51,7 +51,7 @@ TEST(IPCMessageIntegrity, ReadBeyondBufferWStr) { |
//This was BUG 984408. |
uint32 v1 = kuint32max - 1; |
int v2 = 777; |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(v1)); |
EXPECT_TRUE(m.WriteInt(v2)); |
@@ -62,7 +62,7 @@ TEST(IPCMessageIntegrity, ReadBeyondBufferWStr) { |
TEST(IPCMessageIntegrity, ReadBytesBadIterator) { |
// This was BUG 1035467. |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(1)); |
EXPECT_TRUE(m.WriteInt(2)); |
@@ -75,7 +75,7 @@ TEST(IPCMessageIntegrity, ReadVectorNegativeSize) { |
// A slight variation of BUG 984408. Note that the pickling of vector<char> |
// has a specialized template which is not vulnerable to this bug. So here |
// try to hit the non-specialized case vector<P>. |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(-1)); // This is the count of elements. |
EXPECT_TRUE(m.WriteInt(1)); |
EXPECT_TRUE(m.WriteInt(2)); |
@@ -89,7 +89,7 @@ TEST(IPCMessageIntegrity, ReadVectorNegativeSize) { |
TEST(IPCMessageIntegrity, ReadVectorTooLarge1) { |
// This was BUG 1006367. This is the large but positive length case. Again |
// we try to hit the non-specialized case vector<P>. |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(0x21000003)); // This is the count of elements. |
EXPECT_TRUE(m.WriteInt64(1)); |
EXPECT_TRUE(m.WriteInt64(2)); |
@@ -103,7 +103,7 @@ TEST(IPCMessageIntegrity, ReadVectorTooLarge2) { |
// This was BUG 1006367. This is the large but positive with an additional |
// integer overflow when computing the actual byte size. Again we try to hit |
// the non-specialized case vector<P>. |
- IPC::Message m(0, 1); |
+ IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL); |
EXPECT_TRUE(m.WriteInt(0x71000000)); // This is the count of elements. |
EXPECT_TRUE(m.WriteInt64(1)); |
EXPECT_TRUE(m.WriteInt64(2)); |
@@ -164,7 +164,8 @@ class FuzzerServerListener : public SimpleListener { |
} |
bool RoundtripAckReply(int routing, uint32 type_id, int reply) { |
- IPC::Message* message = new IPC::Message(routing, type_id); |
+ IPC::Message* message = new IPC::Message(routing, type_id, |
+ IPC::Message::PRIORITY_NORMAL); |
message->WriteInt(reply + 1); |
message->WriteInt(reply); |
return other_->Send(message); |
@@ -297,7 +298,8 @@ TEST_F(IPCFuzzingTest, MsgBadPayloadShort) { |
ASSERT_TRUE(ConnectChannel()); |
ASSERT_TRUE(StartClient()); |
- IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassIS::ID); |
+ IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassIS::ID, |
+ IPC::Message::PRIORITY_NORMAL); |
msg->WriteInt(666); |
sender()->Send(msg); |
EXPECT_TRUE(listener.ExpectMsgNotHandled(MsgClassIS::ID)); |
@@ -324,7 +326,8 @@ TEST_F(IPCFuzzingTest, MsgBadPayloadArgs) { |
ASSERT_TRUE(ConnectChannel()); |
ASSERT_TRUE(StartClient()); |
- IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassSI::ID); |
+ IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassSI::ID, |
+ IPC::Message::PRIORITY_NORMAL); |
msg->WriteWString(L"d"); |
msg->WriteInt(0); |
msg->WriteInt(0x65); // Extra argument. |
@@ -390,12 +393,14 @@ TEST_F(IPCFuzzingTest, MsgMapExMacro) { |
#if defined(NDEBUG) && !defined(DCHECK_ALWAYS_ON) |
// Test a bad message. |
- msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassSI::ID); |
+ msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassSI::ID, |
+ IPC::Message::PRIORITY_NORMAL); |
msg->WriteInt(2); |
EXPECT_FALSE(server.OnMessageReceived(*msg)); |
delete msg; |
- msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassIS::ID); |
+ msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassIS::ID, |
+ IPC::Message::PRIORITY_NORMAL); |
msg->WriteInt(0x64); |
msg->WriteInt(0x32); |
EXPECT_FALSE(server.OnMessageReceived(*msg)); |