commit | 60bd49088840afbd3d7d81ef9aa08d08bb12c1d7 | [log] [tgz] |
---|---|---|
author | avi <[email protected]> | Wed Sep 23 20:39:24 2015 |
committer | Commit bot <[email protected]> | Wed Sep 23 20:40:21 2015 |
tree | 2a31b639cbbff01501bc9b7909e90e08de4bcbd5 | |
parent | 9cdf26dc942abba0a192ab287d2cac0c052e5859 [diff] [blame] |
Remove DomOperationNotificationDetails. BUG=170921 TEST=all the tests relying on it still pass Review URL: https://codereview.chromium.org/1345123003 Cr-Commit-Position: refs/heads/master@{#350364}
diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc index 55dd9ef..128ea53 100644 --- a/content/browser/security_exploit_browsertest.cc +++ b/content/browser/security_exploit_browsertest.cc
@@ -329,7 +329,7 @@ RenderFrameHost* compromised_renderer = shell()->web_contents()->GetMainFrame(); FrameHostMsg_DomOperationResponse evil(compromised_renderer->GetRoutingID(), - "evil", MSG_ROUTING_NONE); + "evil"); IpcSecurityTestUtil::PwnMessageReceived( compromised_renderer->GetProcess()->GetChannel(), evil);