Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
index 65e3ec0c51fc5efd7efee0ada33c1b9254cc0bea..15779a83542f2eb6c4fd3ac559aad44984716b0f 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
@@ -170,11 +170,7 @@ void PhishingDOMFeatureExtractor::ExtractFeaturesWithTimeout() { |
} else { |
// We just moved to a new frame, so update our frame state |
// and advance to the first element. |
- if (!ResetFrameData()) { |
- // Nothing in this frame, move on to the next one. |
- DLOG(WARNING) << "No content in frame, skipping"; |
- continue; |
- } |
+ ResetFrameData(); |
cur_node = cur_frame_data_->elements.firstItem(); |
} |
@@ -381,7 +377,7 @@ void PhishingDOMFeatureExtractor::Clear() { |
cur_document_.reset(); |
} |
-bool PhishingDOMFeatureExtractor::ResetFrameData() { |
+void PhishingDOMFeatureExtractor::ResetFrameData() { |
DCHECK(!cur_document_.isNull()); |
DCHECK(!cur_frame_data_.get()); |
@@ -390,7 +386,6 @@ bool PhishingDOMFeatureExtractor::ResetFrameData() { |
cur_frame_data_->domain = |
net::RegistryControlledDomainService::GetDomainAndRegistry( |
cur_document_.url()); |
- return true; |
} |
WebKit::WebDocument PhishingDOMFeatureExtractor::GetNextDocument() { |