| Index: chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc
|
| diff --git a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc
|
| index 1779e4ee396fa35549ce24d30ee85e2be2bf0bef..4c4b4b607ee61c65f5601cf8445c39eb37271185 100644
|
| --- a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc
|
| +++ b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc
|
| @@ -137,17 +137,9 @@ void SandboxedZipAnalyzer::StartProcessOnIOThread() {
|
|
|
| void SandboxedZipAnalyzer::OnUtilityProcessStarted() {
|
| DCHECK_CURRENTLY_ON(BrowserThread::IO);
|
| - base::ProcessHandle utility_process =
|
| - content::RenderProcessHost::run_renderer_in_process() ?
|
| - base::GetCurrentProcessHandle() :
|
| - utility_process_host_->GetData().handle;
|
| -
|
| - if (utility_process == base::kNullProcessHandle) {
|
| - DLOG(ERROR) << "Child process handle is null";
|
| - }
|
| utility_process_host_->Send(
|
| new ChromeUtilityMsg_AnalyzeZipFileForDownloadProtection(
|
| - IPC::TakeFileHandleForProcess(std::move(zip_file_), utility_process),
|
| + IPC::TakePlatformFileForTransit(std::move(zip_file_)),
|
| IPC::GetPlatformFileForTransit(temp_file_.GetPlatformFile(),
|
| false /* !close_source_handle */)));
|
| }
|
|
|