| Index: third_party/WebKit/Source/core/dom/DocumentInit.cpp | 
| diff --git a/third_party/WebKit/Source/core/dom/DocumentInit.cpp b/third_party/WebKit/Source/core/dom/DocumentInit.cpp | 
| index 19d9eb60be68cea26400c506b69b71865ad1288c..0ac3139e5fd37d342bb0014552ab3b297a9cbf45 100644 | 
| --- a/third_party/WebKit/Source/core/dom/DocumentInit.cpp | 
| +++ b/third_party/WebKit/Source/core/dom/DocumentInit.cpp | 
| @@ -96,13 +96,13 @@ SandboxFlags DocumentInit::getSandboxFlags() const { | 
| FrameLoader* loader = &frameForSecurityContext()->loader(); | 
| SandboxFlags flags = loader->effectiveSandboxFlags(); | 
|  | 
| -  // If the load was blocked by X-Frame-Options or CSP, force the Document's | 
| -  // origin to be unique, so that the blocked document appears to be a normal | 
| -  // cross-origin document's load per CSP spec: | 
| -  // https://www.w3.org/TR/CSP2/#directive-frame-ancestors | 
| +  // If the load was blocked by CSP, force the Document's origin to be unique, | 
| +  // so that the blocked document appears to be a normal cross-origin document's | 
| +  // load per CSP spec: https://www.w3.org/TR/CSP3/#directive-frame-ancestors. | 
| if (loader->documentLoader() && | 
| -      loader->documentLoader()->wasBlockedAfterXFrameOptionsOrCSP()) | 
| +      loader->documentLoader()->wasBlockedAfterCSP()) { | 
| flags |= SandboxOrigin; | 
| +  } | 
|  | 
| return flags; | 
| } | 
|  |