Remove too agressive DCHECK.

Boot classpath does contain soft failures, eg:
com.android.framework.protobuf.UnsafeUtil$JvmMemoryAccessor

Bug: 141606408
Test: libartd boots
Change-Id: Ife657a295560420fd69d14bc11c85720e250f4aa
diff --git a/runtime/interpreter/interpreter.cc b/runtime/interpreter/interpreter.cc
index 0e5fdd4..b5b01fe 100644
--- a/runtime/interpreter/interpreter.cc
+++ b/runtime/interpreter/interpreter.cc
@@ -390,12 +390,6 @@
   } else {
     // Enter the "with access check" interpreter.
 
-    // The boot classpath should really not have to run access checks.
-    DCHECK(method->GetDeclaringClass()->GetClassLoader() != nullptr
-           || Runtime::Current()->IsVerificationSoftFail()
-           || Runtime::Current()->IsAotCompiler())
-        << method->PrettyMethod();
-
     if (kInterpreterImplKind == kMterpImplKind) {
       // No access check variants for Mterp.  Just use the switch version.
       if (transaction_active) {