| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 3e8868aa682761c7884170a534fc7bd2b990e928..3cf58583613241881c9693fdf628da682ed2c3ae 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -30,7 +30,6 @@
|
| #include "storage/browser/fileapi/isolated_context.h"
|
| #include "storage/common/fileapi/file_system_util.h"
|
| #include "url/gurl.h"
|
| -#include "url/url_util.h"
|
|
|
| namespace content {
|
|
|
| @@ -629,7 +628,7 @@ bool ChildProcessSecurityPolicyImpl::CanRequestURL(
|
| if (IsPseudoScheme(url.scheme())) {
|
| // Every child process can request <about:blank>, <about:blank?foo>,
|
| // <about:blank/#foo> and <about:srcdoc>.
|
| - if (url::IsAboutBlank(url) || url == kAboutSrcDocURL)
|
| + if (url.IsAboutBlank() || url == kAboutSrcDocURL)
|
| return true;
|
| // URLs like <about:version>, <about:crash>, <view-source:...> shouldn't be
|
| // requestable by any child process. Also, this case covers
|
|
|