Index: Source/core/dom/ExecutionContext.cpp |
diff --git a/Source/core/dom/ExecutionContext.cpp b/Source/core/dom/ExecutionContext.cpp |
index a0b89148f4c2026c95172ba8a3147e3d5bd579ce..26f8f9893e5981fd1e1c19a5319335047d8dd75e 100644 |
--- a/Source/core/dom/ExecutionContext.cpp |
+++ b/Source/core/dom/ExecutionContext.cpp |
@@ -128,9 +128,9 @@ bool ExecutionContext::shouldSanitizeScriptError(const String& sourceURL, Access |
return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); |
} |
-void ExecutionContext::reportException(PassRefPtr<ErrorEvent> event, PassRefPtr<ScriptCallStack> callStack, AccessControlStatus corsStatus) |
+void ExecutionContext::reportException(PassRefPtrWillBeRawPtr<ErrorEvent> event, PassRefPtr<ScriptCallStack> callStack, AccessControlStatus corsStatus) |
{ |
- RefPtr<ErrorEvent> errorEvent = event; |
+ RefPtrWillBeRawPtr<ErrorEvent> errorEvent = event; |
if (m_inDispatchErrorEvent) { |
if (!m_pendingExceptions) |
m_pendingExceptions = adoptPtr(new Vector<OwnPtr<PendingException> >()); |
@@ -167,7 +167,7 @@ void ExecutionContext::addConsoleMessage(MessageSource source, MessageLevel leve |
m_client->addMessage(source, level, message, String(), 0, state); |
} |
-bool ExecutionContext::dispatchErrorEvent(PassRefPtr<ErrorEvent> event, AccessControlStatus corsStatus) |
+bool ExecutionContext::dispatchErrorEvent(PassRefPtrWillBeRawPtr<ErrorEvent> event, AccessControlStatus corsStatus) |
{ |
if (!m_client) |
return false; |
@@ -175,7 +175,7 @@ bool ExecutionContext::dispatchErrorEvent(PassRefPtr<ErrorEvent> event, AccessCo |
if (!target) |
return false; |
- RefPtr<ErrorEvent> errorEvent = event; |
+ RefPtrWillBeRawPtr<ErrorEvent> errorEvent = event; |
if (shouldSanitizeScriptError(errorEvent->filename(), corsStatus)) |
errorEvent = ErrorEvent::createSanitizedError(errorEvent->world()); |