Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(753)

Unified Diff: chrome/browser/child_process_security_policy.cc

Issue 6142009: Upating the app, ceee, chrome, ipc, media, and net directories to use the correct lock.h file. (Closed) Base URL: http://git.chromium.org/git/chromium.git@trunk
Patch Set: Unified patch updating all references to the new base/synchronization/lock.h Created 9 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/child_process_security_policy.cc
diff --git a/chrome/browser/child_process_security_policy.cc b/chrome/browser/child_process_security_policy.cc
index ea1f725189b7935db2098debaedcb0a02b680321..0ea3e1d2dcb820de495db40fe883acead2cb5cdc 100644
--- a/chrome/browser/child_process_security_policy.cc
+++ b/chrome/browser/child_process_security_policy.cc
@@ -151,7 +151,7 @@ ChildProcessSecurityPolicy* ChildProcessSecurityPolicy::GetInstance() {
}
void ChildProcessSecurityPolicy::Add(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
if (security_state_.count(child_id) != 0) {
NOTREACHED() << "Add child process at most once.";
return;
@@ -161,7 +161,7 @@ void ChildProcessSecurityPolicy::Add(int child_id) {
}
void ChildProcessSecurityPolicy::Remove(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
if (!security_state_.count(child_id))
return; // May be called multiple times.
@@ -171,7 +171,7 @@ void ChildProcessSecurityPolicy::Remove(int child_id) {
void ChildProcessSecurityPolicy::RegisterWebSafeScheme(
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
DCHECK(web_safe_schemes_.count(scheme) == 0) << "Add schemes at most once.";
DCHECK(pseudo_schemes_.count(scheme) == 0) << "Web-safe implies not psuedo.";
@@ -179,14 +179,14 @@ void ChildProcessSecurityPolicy::RegisterWebSafeScheme(
}
bool ChildProcessSecurityPolicy::IsWebSafeScheme(const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
return (web_safe_schemes_.find(scheme) != web_safe_schemes_.end());
}
void ChildProcessSecurityPolicy::RegisterPseudoScheme(
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
DCHECK(pseudo_schemes_.count(scheme) == 0) << "Add schemes at most once.";
DCHECK(web_safe_schemes_.count(scheme) == 0) <<
"Psuedo implies not web-safe.";
@@ -195,7 +195,7 @@ void ChildProcessSecurityPolicy::RegisterPseudoScheme(
}
bool ChildProcessSecurityPolicy::IsPseudoScheme(const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
return (pseudo_schemes_.find(scheme) != pseudo_schemes_.end());
}
@@ -224,7 +224,7 @@ void ChildProcessSecurityPolicy::GrantRequestURL(
}
{
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
return;
@@ -242,7 +242,7 @@ void ChildProcessSecurityPolicy::GrantReadFile(int child_id,
void ChildProcessSecurityPolicy::GrantPermissionsForFile(
int child_id, const FilePath& file, int permissions) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -253,7 +253,7 @@ void ChildProcessSecurityPolicy::GrantPermissionsForFile(
void ChildProcessSecurityPolicy::RevokeAllPermissionsForFile(
int child_id, const FilePath& file) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -264,7 +264,7 @@ void ChildProcessSecurityPolicy::RevokeAllPermissionsForFile(
void ChildProcessSecurityPolicy::GrantScheme(int child_id,
const std::string& scheme) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -274,7 +274,7 @@ void ChildProcessSecurityPolicy::GrantScheme(int child_id,
}
void ChildProcessSecurityPolicy::GrantDOMUIBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -290,7 +290,7 @@ void ChildProcessSecurityPolicy::GrantDOMUIBindings(int child_id) {
}
void ChildProcessSecurityPolicy::GrantExtensionBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -300,7 +300,7 @@ void ChildProcessSecurityPolicy::GrantExtensionBindings(int child_id) {
}
void ChildProcessSecurityPolicy::GrantReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -310,7 +310,7 @@ void ChildProcessSecurityPolicy::GrantReadRawCookies(int child_id) {
}
void ChildProcessSecurityPolicy::RevokeReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -354,7 +354,7 @@ bool ChildProcessSecurityPolicy::CanRequestURL(
return true; // This URL request is destined for ShellExecute.
{
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -373,7 +373,7 @@ bool ChildProcessSecurityPolicy::CanReadFile(int child_id,
bool ChildProcessSecurityPolicy::HasPermissionsForFile(
int child_id, const FilePath& file, int permissions) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -383,7 +383,7 @@ bool ChildProcessSecurityPolicy::HasPermissionsForFile(
}
bool ChildProcessSecurityPolicy::HasDOMUIBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -393,7 +393,7 @@ bool ChildProcessSecurityPolicy::HasDOMUIBindings(int child_id) {
}
bool ChildProcessSecurityPolicy::HasExtensionBindings(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
@@ -403,7 +403,7 @@ bool ChildProcessSecurityPolicy::HasExtensionBindings(int child_id) {
}
bool ChildProcessSecurityPolicy::CanReadRawCookies(int child_id) {
- AutoLock lock(lock_);
+ base::AutoLock lock(lock_);
SecurityStateMap::iterator state = security_state_.find(child_id);
if (state == security_state_.end())
« no previous file with comments | « chrome/browser/child_process_security_policy.h ('k') | chrome/browser/chromeos/dom_ui/system_settings_provider.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698