Remove too agressive DCHECK.
Boot classpath does contain soft failures, eg:
com.android.framework.protobuf.UnsafeUtil$JvmMemoryAccessor
Bug: 141606408
Test: libartd boots
Change-Id: Ife657a295560420fd69d14bc11c85720e250f4aa
diff --git a/runtime/interpreter/interpreter.cc b/runtime/interpreter/interpreter.cc
index 0e5fdd4..b5b01fe 100644
--- a/runtime/interpreter/interpreter.cc
+++ b/runtime/interpreter/interpreter.cc
@@ -390,12 +390,6 @@
} else {
// Enter the "with access check" interpreter.
- // The boot classpath should really not have to run access checks.
- DCHECK(method->GetDeclaringClass()->GetClassLoader() != nullptr
- || Runtime::Current()->IsVerificationSoftFail()
- || Runtime::Current()->IsAotCompiler())
- << method->PrettyMethod();
-
if (kInterpreterImplKind == kMterpImplKind) {
// No access check variants for Mterp. Just use the switch version.
if (transaction_active) {