| Index: chrome/browser/utility_process_host.cc | 
| diff --git a/chrome/browser/utility_process_host.cc b/chrome/browser/utility_process_host.cc | 
| index 324a7f553ac290945a6c9c0144c479ee8c87da1f..be5397e667f7b9b7ffbd385f26af2b53f89130d0 100644 | 
| --- a/chrome/browser/utility_process_host.cc | 
| +++ b/chrome/browser/utility_process_host.cc | 
| @@ -26,32 +26,9 @@ UtilityProcessHost::~UtilityProcessHost() { | 
| } | 
|  | 
| bool UtilityProcessHost::StartExtensionUnpacker(const FilePath& extension) { | 
| -  FilePath initial_path = extension.DirName(); | 
| -  FilePath real_path; | 
| - | 
| -  // The utility process will have access to the directory passed to | 
| -  // StartProcess().  That directory should not be a symlink or NTFS | 
| -  // junctions, because when the path is used, following the link will | 
| -  // cause file system access outside the sandbox path. | 
| - | 
| -#if defined(OS_POSIX) | 
| -  // Resolve symlinks to get a symlink free path. | 
| -  if (!file_util::RealPath(initial_path, &real_path)) { | 
| -    real_path = initial_path; | 
| -  } | 
| -#else | 
| -  // TODO(skerner): For windows, we need to expand NTFS junctions. | 
| -  // http://crbug.com/13044 | 
| -  real_path = initial_path; | 
| -#endif | 
| - | 
| -  // TODO(skerner): Remove this logging once we understand crbug.com/35198 | 
| -  LOG(INFO) << "initial_path: " << initial_path.value(); | 
| -  LOG(INFO) << "real_path: " << real_path.value(); | 
| - | 
| // Grant the subprocess access to the entire subdir the extension file is | 
| // in, so that it can unpack to that dir. | 
| -  if (!StartProcess(real_path)) | 
| +  if (!StartProcess(extension.DirName())) | 
| return false; | 
|  | 
| Send(new UtilityMsg_UnpackExtension(extension)); | 
|  |