Index: chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
diff --git a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
index 1779e4ee396fa35549ce24d30ee85e2be2bf0bef..4c4b4b607ee61c65f5601cf8445c39eb37271185 100644 |
--- a/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
+++ b/chrome/browser/safe_browsing/sandboxed_zip_analyzer.cc |
@@ -137,17 +137,9 @@ void SandboxedZipAnalyzer::StartProcessOnIOThread() { |
void SandboxedZipAnalyzer::OnUtilityProcessStarted() { |
DCHECK_CURRENTLY_ON(BrowserThread::IO); |
- base::ProcessHandle utility_process = |
- content::RenderProcessHost::run_renderer_in_process() ? |
- base::GetCurrentProcessHandle() : |
- utility_process_host_->GetData().handle; |
- |
- if (utility_process == base::kNullProcessHandle) { |
- DLOG(ERROR) << "Child process handle is null"; |
- } |
utility_process_host_->Send( |
new ChromeUtilityMsg_AnalyzeZipFileForDownloadProtection( |
- IPC::TakeFileHandleForProcess(std::move(zip_file_), utility_process), |
+ IPC::TakePlatformFileForTransit(std::move(zip_file_)), |
IPC::GetPlatformFileForTransit(temp_file_.GetPlatformFile(), |
false /* !close_source_handle */))); |
} |