| Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
 | 
| diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
 | 
| index feee111e1b841d197847af4599d8229dd50ee9b3..5bb78b6fc13b1050fa5cca47ae045181a975c295 100644
 | 
| --- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
 | 
| +++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
 | 
| @@ -386,8 +386,9 @@ void PhishingDOMFeatureExtractor::ResetFrameData() {
 | 
|    cur_frame_data_.reset(new FrameData());
 | 
|    cur_frame_data_->elements = cur_document_.all();
 | 
|    cur_frame_data_->domain =
 | 
| -      net::RegistryControlledDomainService::GetDomainAndRegistry(
 | 
| -          cur_document_.url());
 | 
| +      net::registry_controlled_domains::GetDomainAndRegistry(
 | 
| +          cur_document_.url(),
 | 
| +          net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES);
 | 
|  }
 | 
|  
 | 
|  WebKit::WebDocument PhishingDOMFeatureExtractor::GetNextDocument() {
 | 
| @@ -422,8 +423,8 @@ bool PhishingDOMFeatureExtractor::IsExternalDomain(const GURL& url,
 | 
|    if (url.HostIsIPAddress()) {
 | 
|      domain->assign(url.host());
 | 
|    } else {
 | 
| -    domain->assign(net::RegistryControlledDomainService::GetDomainAndRegistry(
 | 
| -        url));
 | 
| +    domain->assign(net::registry_controlled_domains::GetDomainAndRegistry(
 | 
| +        url, net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES));
 | 
|    }
 | 
|  
 | 
|    return !domain->empty() && *domain != cur_frame_data_->domain;
 | 
| 
 |