| Index: content/browser/security_exploit_browsertest.cc
|
| diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc
|
| index 128ea53040e4c92683a1de58bdc03688f311cce2..2c5acc4c48df74d295c899470cd33b4f0c7943b9 100644
|
| --- a/content/browser/security_exploit_browsertest.cc
|
| +++ b/content/browser/security_exploit_browsertest.cc
|
| @@ -236,8 +236,7 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest,
|
| // different timing in the test, let's simulate a CreateNewWidget call coming
|
| // from the IO thread. Use the existing window routing id to cause a
|
| // deliberate collision.
|
| - pending_rvh->CreateNewWidget(duplicate_routing_id, 0 /* surface_id */,
|
| - blink::WebPopupTypePage);
|
| + pending_rvh->CreateNewWidget(duplicate_routing_id, blink::WebPopupTypePage);
|
|
|
| // If the above operation doesn't crash, the test has succeeded!
|
| }
|
|
|