Index: content/browser/security_exploit_browsertest.cc |
diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc |
index 128ea53040e4c92683a1de58bdc03688f311cce2..2c5acc4c48df74d295c899470cd33b4f0c7943b9 100644 |
--- a/content/browser/security_exploit_browsertest.cc |
+++ b/content/browser/security_exploit_browsertest.cc |
@@ -236,8 +236,7 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, |
// different timing in the test, let's simulate a CreateNewWidget call coming |
// from the IO thread. Use the existing window routing id to cause a |
// deliberate collision. |
- pending_rvh->CreateNewWidget(duplicate_routing_id, 0 /* surface_id */, |
- blink::WebPopupTypePage); |
+ pending_rvh->CreateNewWidget(duplicate_routing_id, blink::WebPopupTypePage); |
// If the above operation doesn't crash, the test has succeeded! |
} |