Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index d5fd09fda6da5d15c3273c61e4553a2cf8e31311..b8981ce7f0c93b21f7e88f830f7718cce0cc4b42 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -515,15 +515,9 @@ bool ChildProcessSecurityPolicyImpl::CanLoadPage( |
// stronger security restrictions on page navigation. |
if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) && |
ResourceType::IsFrame(resource_type)) { |
- // TODO(irobert): This currently breaks some WebUI page such as |
- // "chrome://extensions/" (belongs to site chrome://chrome/) which |
- // will load an iframe for the page "chrome://uber-frame/" |
- // (belongs to site chrome://uber-frame/). |
- base::AutoLock lock(lock_); |
- SecurityStateMap::iterator state = security_state_.find(child_id); |
- if (state == security_state_.end()) |
- return false; |
- return state->second->CanLoadPage(url); |
+ // TODO(nasko): Do the proper check for site-per-process, once |
+ // out-of-process iframes is ready to go. |
+ return true; |
} |
return true; |
} |