| Index: content/browser/security_exploit_browsertest.cc
|
| diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc
|
| index 2c5acc4c48df74d295c899470cd33b4f0c7943b9..1358af28fd98e39ce08854b993b5e1544661e6c9 100644
|
| --- a/content/browser/security_exploit_browsertest.cc
|
| +++ b/content/browser/security_exploit_browsertest.cc
|
| @@ -196,7 +196,7 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest, SetWebUIProperty) {
|
| // process.
|
| IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest,
|
| AttemptDuplicateRenderViewHost) {
|
| - int duplicate_routing_id = MSG_ROUTING_NONE;
|
| + int32_t duplicate_routing_id = MSG_ROUTING_NONE;
|
| RenderViewHostImpl* pending_rvh =
|
| PrepareToDuplicateHosts(shell(), &duplicate_routing_id);
|
| EXPECT_NE(MSG_ROUTING_NONE, duplicate_routing_id);
|
| @@ -213,10 +213,12 @@ IN_PROC_BROWSER_TEST_F(SecurityExploitBrowserTest,
|
| scoped_refptr<SessionStorageNamespaceImpl> session_storage(
|
| new SessionStorageNamespaceImpl(dom_storage_context));
|
| // Cause a deliberate collision in routing ids.
|
| - int main_frame_routing_id = duplicate_routing_id + 1;
|
| - pending_rvh->CreateNewWindow(duplicate_routing_id,
|
| - main_frame_routing_id,
|
| - params,
|
| + int32_t main_frame_routing_id = duplicate_routing_id + 1;
|
| + // TODO(avi): This should be made unique from the view routing ID once
|
| + // RenderViewHostImpl has-a RenderWidgetHostImpl. https://crbug.com/545684
|
| + int32_t main_frame_widget_routing_id = duplicate_routing_id;
|
| + pending_rvh->CreateNewWindow(duplicate_routing_id, main_frame_routing_id,
|
| + main_frame_widget_routing_id, params,
|
| session_storage.get());
|
|
|
| // If the above operation doesn't cause a crash, the test has succeeded!
|
|
|