Index: chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
diff --git a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
index 92b5716197a0724bd72006f3e05bca730b0abbff..f23a7241661107837fc78c409f85e77319649b6c 100644 |
--- a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
+++ b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
@@ -12,12 +12,14 @@ |
#include "base/threading/sequenced_worker_pool.h" |
#include "chrome/common/chrome_utility_messages.h" |
#include "chrome/common/safe_browsing/zip_analyzer_results.h" |
+#include "chrome/grit/generated_resources.h" |
#include "content/public/browser/browser_thread.h" |
#include "content/public/browser/child_process_data.h" |
#include "content/public/browser/render_process_host.h" |
#include "content/public/common/content_switches.h" |
#include "ipc/ipc_message_macros.h" |
#include "ipc/ipc_platform_file.h" |
+#include "ui/base/l10n/l10n_util.h" |
using content::BrowserThread; |
@@ -115,6 +117,8 @@ void SandboxedZipAnalyzer::StartProcessOnIOThread() { |
this, |
BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO).get()) |
->AsWeakPtr(); |
+ utility_process_host_->SetName(l10n_util::GetStringUTF16( |
+ IDS_UTILITY_PROCESS_SAFE_BROWSING_ZIP_FILE_ANALYZER_NAME)); |
utility_process_host_->Send(new ChromeUtilityMsg_StartupPing); |
// Wait for the startup notification before sending the main IPC to the |
// utility process, so that we can dup the file handle. |