| Index: chrome/browser/safe_browsing/client_side_detection_host.cc
 | 
| diff --git a/chrome/browser/safe_browsing/client_side_detection_host.cc b/chrome/browser/safe_browsing/client_side_detection_host.cc
 | 
| index 3e497308463fa9675b35a283d7601eb7a4adb089..6291766d47dadeb12e57df2a79988e75d17d9bc1 100644
 | 
| --- a/chrome/browser/safe_browsing/client_side_detection_host.cc
 | 
| +++ b/chrome/browser/safe_browsing/client_side_detection_host.cc
 | 
| @@ -77,7 +77,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|          host_(host),
 | 
|          start_phishing_classification_cb_(start_phishing_classification),
 | 
|          start_malware_classification_cb_(start_malware_classification) {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      DCHECK(web_contents_);
 | 
|      DCHECK(csd_service_);
 | 
|      DCHECK(database_manager_.get());
 | 
| @@ -85,7 +85,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|    }
 | 
|  
 | 
|    void Start() {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|  
 | 
|      // We start by doing some simple checks that can run on the UI thread.
 | 
|      UMA_HISTOGRAM_BOOLEAN("SBClientPhishing.ClassificationStart", 1);
 | 
| @@ -174,17 +174,17 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|    virtual ~ShouldClassifyUrlRequest() { }
 | 
|  
 | 
|    bool ShouldClassifyForPhishing() const {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      return !start_phishing_classification_cb_.is_null();
 | 
|    }
 | 
|  
 | 
|    bool ShouldClassifyForMalware() const {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      return !start_malware_classification_cb_.is_null();
 | 
|    }
 | 
|  
 | 
|    void DontClassifyForPhishing(PreClassificationCheckFailures reason) {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      if (ShouldClassifyForPhishing()) {
 | 
|        // Track the first reason why we stopped classifying for phishing.
 | 
|        UMA_HISTOGRAM_ENUMERATION("SBClientPhishing.PreClassificationCheckFail",
 | 
| @@ -197,7 +197,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|    }
 | 
|  
 | 
|    void DontClassifyForMalware(PreClassificationCheckFailures reason) {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      if (ShouldClassifyForMalware()) {
 | 
|        // Track the first reason why we stopped classifying for malware.
 | 
|        UMA_HISTOGRAM_ENUMERATION("SBClientMalware.PreClassificationCheckFail",
 | 
| @@ -210,7 +210,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|    }
 | 
|  
 | 
|    void CheckSafeBrowsingDatabase(const GURL& url) {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::IO);
 | 
|      // We don't want to call the classification callbacks from the IO
 | 
|      // thread so we simply pass the results of this method to CheckCache()
 | 
|      // which is called on the UI thread;
 | 
| @@ -241,7 +241,7 @@ class ClientSideDetectionHost::ShouldClassifyUrlRequest
 | 
|  
 | 
|    void CheckCache(PreClassificationCheckFailures phishing_reason,
 | 
|                    PreClassificationCheckFailures malware_reason) {
 | 
| -    DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +    DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|      if (phishing_reason != NO_CLASSIFY_MAX)
 | 
|        DontClassifyForPhishing(phishing_reason);
 | 
|      if (malware_reason != NO_CLASSIFY_MAX)
 | 
| @@ -489,7 +489,7 @@ void ClientSideDetectionHost::WebContentsDestroyed() {
 | 
|  
 | 
|  void ClientSideDetectionHost::OnPhishingPreClassificationDone(
 | 
|      bool should_classify) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    if (browse_info_.get() && should_classify) {
 | 
|      DVLOG(1) << "Instruct renderer to start phishing detection for URL: "
 | 
|               << browse_info_->url;
 | 
| @@ -501,7 +501,7 @@ void ClientSideDetectionHost::OnPhishingPreClassificationDone(
 | 
|  
 | 
|  void ClientSideDetectionHost::OnMalwarePreClassificationDone(
 | 
|      bool should_classify) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    // If classification checks failed we should stop extracting malware features.
 | 
|    DVLOG(2) << "Malware pre-classification checks done. Should classify: "
 | 
|             << should_classify;
 | 
| @@ -511,7 +511,7 @@ void ClientSideDetectionHost::OnMalwarePreClassificationDone(
 | 
|  }
 | 
|  
 | 
|  void ClientSideDetectionHost::DidStopLoading() {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    if (!csd_service_ || !browse_info_.get())
 | 
|      return;
 | 
|    DVLOG(2) << "Page finished loading.";
 | 
| @@ -520,7 +520,7 @@ void ClientSideDetectionHost::DidStopLoading() {
 | 
|  }
 | 
|  
 | 
|  void ClientSideDetectionHost::MaybeStartMalwareFeatureExtraction() {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    if (csd_service_ && browse_info_.get() &&
 | 
|        should_classify_for_malware_ &&
 | 
|        pageload_complete_) {
 | 
| @@ -546,7 +546,7 @@ void ClientSideDetectionHost::MaybeStartMalwareFeatureExtraction() {
 | 
|  
 | 
|  void ClientSideDetectionHost::OnPhishingDetectionDone(
 | 
|      const std::string& verdict_str) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    // There is something seriously wrong if there is no service class but
 | 
|    // this method is called.  The renderer should not start phishing detection
 | 
|    // if there isn't any service class in the browser.
 | 
| @@ -581,7 +581,7 @@ void ClientSideDetectionHost::OnPhishingDetectionDone(
 | 
|  
 | 
|  void ClientSideDetectionHost::MaybeShowPhishingWarning(GURL phishing_url,
 | 
|                                                         bool is_phishing) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    DVLOG(2) << "Received server phishing verdict for URL:" << phishing_url
 | 
|             << " is_phishing:" << is_phishing;
 | 
|    if (is_phishing) {
 | 
| @@ -612,7 +612,7 @@ void ClientSideDetectionHost::MaybeShowPhishingWarning(GURL phishing_url,
 | 
|  void ClientSideDetectionHost::MaybeShowMalwareWarning(GURL original_url,
 | 
|                                                        GURL malware_url,
 | 
|                                                        bool is_malware) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    DVLOG(2) << "Received server malawre IP verdict for URL:" << malware_url
 | 
|             << " is_malware:" << is_malware;
 | 
|    if (is_malware && malware_url.is_valid() && original_url.is_valid()) {
 | 
| @@ -700,7 +700,7 @@ void ClientSideDetectionHost::Observe(
 | 
|      int type,
 | 
|      const content::NotificationSource& source,
 | 
|      const content::NotificationDetails& details) {
 | 
| -  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
 | 
| +  DCHECK_CURRENTLY_ON(BrowserThread::UI);
 | 
|    DCHECK_EQ(type, content::NOTIFICATION_RESOURCE_RESPONSE_STARTED);
 | 
|    const ResourceRequestDetails* req = content::Details<ResourceRequestDetails>(
 | 
|        details).ptr();
 | 
| 
 |