Chromium Code Reviews| Index: content/browser/site_per_process_browsertest.cc |
| diff --git a/content/browser/site_per_process_browsertest.cc b/content/browser/site_per_process_browsertest.cc |
| index 6bb654a15b58f2bf84fac0ded993a0b6cd45f212..2f37ca326999886e4447044226f2be669eb3944b 100644 |
| --- a/content/browser/site_per_process_browsertest.cc |
| +++ b/content/browser/site_per_process_browsertest.cc |
| @@ -28,6 +28,7 @@ |
| #include "content/public/browser/notification_observer.h" |
| #include "content/public/browser/notification_service.h" |
| #include "content/public/browser/notification_types.h" |
| +#include "content/public/browser/resource_dispatcher_host.h" |
| #include "content/public/common/content_switches.h" |
| #include "content/public/test/browser_test_utils.h" |
| #include "content/public/test/content_browser_test_utils.h" |
| @@ -3626,4 +3627,77 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, OpenerSetLocation) { |
| EXPECT_EQ(shell()->web_contents()->GetLastCommittedURL(), cross_url); |
| } |
| +// This test ensures that RenderFrame isn't leaked in the renderer process if |
|
Charlie Reis
2015/10/29 17:28:58
nit: that the
nasko
2015/10/29 19:09:45
Done.
|
| +// a pending cross-process navigation is cancelled. The test works by by trying |
| +// to create a new RenderFrame with the same routing id. If there is an |
| +// entry with the same routing ID, a CHECK is hit and the process crashes. |
| +IN_PROC_BROWSER_TEST_F(SitePerProcessBrowserTest, |
| + SubframePendingAndBackToSameSiteInstance) { |
| + GURL main_url(embedded_test_server()->GetURL( |
| + "a.com", "/cross_site_iframe_factory.html?a(b)")); |
| + NavigateToURL(shell(), main_url); |
| + |
| + // Capture the FrameTreeNode this test will be navigating. |
| + FrameTreeNode* node = static_cast<WebContentsImpl*>(shell()->web_contents()) |
| + ->GetFrameTree() |
| + ->root() |
| + ->child_at(0); |
| + EXPECT_TRUE(node); |
| + EXPECT_NE(node->current_frame_host()->GetSiteInstance(), |
| + node->parent()->current_frame_host()->GetSiteInstance()); |
| + |
| + // Navigate to the site of the parent, but to a page that will not commit. |
| + GURL same_site_url(embedded_test_server()->GetURL("a.com", "/title1.html")); |
| + NavigationStallDelegate stall_delegate(same_site_url); |
| + ResourceDispatcherHost::Get()->SetDelegate(&stall_delegate); |
| + { |
| + NavigationController::LoadURLParams params(same_site_url); |
| + params.transition_type = ui::PAGE_TRANSITION_LINK; |
| + params.frame_tree_node_id = node->frame_tree_node_id(); |
| + node->navigator()->GetController()->LoadURLWithParams(params); |
| + } |
| + |
| + // Grab the routing id of the pending RenderFrameHost and setup a process |
|
Charlie Reis
2015/10/29 17:28:58
nit: set up
nasko
2015/10/29 19:09:45
Done.
|
| + // observer to ensure there is no crash when a new RenderFrame creation is |
| + // attempted. |
| + RenderProcessHost* process = |
| + node->render_manager()->pending_frame_host()->GetProcess(); |
| + RenderProcessHostWatcher watcher( |
| + process, RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); |
| + int frame_routing_id = |
| + node->render_manager()->pending_frame_host()->GetRoutingID(); |
| + int proxy_routing_id = |
| + node->render_manager()->GetProxyToParent()->GetRoutingID(); |
| + |
| + // Now go to c.com so the navigation to a.com is cancelled and send an IPC |
| + // to create a new RenderFrame with the routing id of the previously pending |
| + // one. |
| + NavigateFrameToURL(node, |
| + embedded_test_server()->GetURL("c.com", "/title2.html")); |
| + { |
| + FrameMsg_NewFrame_Params params; |
| + params.routing_id = frame_routing_id; |
| + params.proxy_routing_id = proxy_routing_id; |
| + params.opener_routing_id = MSG_ROUTING_NONE; |
| + params.parent_routing_id = |
| + shell()->web_contents()->GetMainFrame()->GetRoutingID(); |
| + params.previous_sibling_routing_id = MSG_ROUTING_NONE; |
| + params.widget_params.routing_id = MSG_ROUTING_NONE; |
| + params.widget_params.hidden = true; |
| + |
| + process->Send(new FrameMsg_NewFrame(params)); |
|
Charlie Reis
2015/10/29 17:28:58
I'm a bit surprised this works cleanly. I guess w
nasko
2015/10/29 19:09:45
Yes, we don't have any checks for possible reuse.
|
| + } |
| + |
| + // The test must wait for a process to exit, but if there is no leak, the |
| + // RenderFrame will be properly created and there will be no crash. |
| + // Therefore, navigate the main frame to completely different site, which |
| + // will cause the original process to exit cleanly. |
| + EXPECT_TRUE(NavigateToURL( |
| + shell(), embedded_test_server()->GetURL("d.com", "/title3.html"))); |
| + watcher.Wait(); |
| + EXPECT_TRUE(watcher.did_exit_normally()); |
| + |
| + ResourceDispatcherHost::Get()->SetDelegate(nullptr); |
| +} |
| + |
| } // namespace content |