Index: chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
diff --git a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
index 516708dd064649e7e0b088546a424a698e2cb3d1..90cb30972abefac1bc7b3940ddfeb56b2e64e7a1 100644 |
--- a/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
+++ b/chrome/browser/safe_browsing/safe_browsing_blocking_page_test.cc |
@@ -561,8 +561,14 @@ class SafeBrowsingBlockingPageTest : public InProcessBrowserTest { |
DISALLOW_COPY_AND_ASSIGN(SafeBrowsingBlockingPageTest); |
}; |
+// TODO(linux_aura) http://crbug.com/163931 |
+#if defined(OS_LINUX) && !defined(OS_CHROMEOS) && defined(USE_AURA) |
+#define MAYBE_MalwareRedirectInIFrameCanceled DISABLED_MalwareRedirectInIFrameCanceled |
+#else |
+#define MAYBE_MalwareRedirectInIFrameCanceled MalwareRedirectInIFrameCanceled |
+#endif |
IN_PROC_BROWSER_TEST_F(SafeBrowsingBlockingPageTest, |
- MalwareRedirectInIFrameCanceled) { |
+ MAYBE_MalwareRedirectInIFrameCanceled) { |
// 1. Test the case that redirect is a subresource. |
MalwareRedirectCancelAndProceed("openWinIFrame"); |
// If the redirect was from subresource but canceled, "proceed" will continue |