Index: content/browser/fileapi/fileapi_message_filter.cc |
diff --git a/content/browser/fileapi/fileapi_message_filter.cc b/content/browser/fileapi/fileapi_message_filter.cc |
index 61b552bd329972a8403896889a54bef003a376b2..63641e13f01b1dfef03a66539d13034db3a90acf 100644 |
--- a/content/browser/fileapi/fileapi_message_filter.cc |
+++ b/content/browser/fileapi/fileapi_message_filter.cc |
@@ -749,12 +749,14 @@ void FileAPIMessageFilter::DidCreateSnapshot( |
// - the file comes from sandboxed filesystem. Reading sandboxed files is |
// always permitted, but only implicitly. |
// - the underlying filesystem returned newly created snapshot file. |
- // - the file comes from an external drive filesystem. The renderer has |
- // already been granted read permission for the file's nominal path, but |
- // for drive files, platform paths differ from the nominal paths. |
+ // - the nominal path differs from the platform path. This can happen even |
+ // when the filesystem has been granted permissions. This happens with: |
+ // - Drive filesystems |
+ // - Picasa filesystems |
DCHECK(snapshot_file || |
fileapi::SandboxMountPointProvider::IsSandboxType(url.type()) || |
- url.type() == fileapi::kFileSystemTypeDrive); |
+ url.type() == fileapi::kFileSystemTypeDrive || |
+ url.type() == fileapi::kFileSystemTypePicasa); |
ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile( |
process_id_, platform_path); |
if (snapshot_file) { |