| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/render_frame_impl.h" | 5 #include "content/renderer/render_frame_impl.h" |
| 6 | 6 |
| 7 #include <map> | 7 #include <map> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <utility> | 9 #include <utility> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 442 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 453 const char kCorruptHeapBlock[] = "/corrupt-heap-block"; | 453 const char kCorruptHeapBlock[] = "/corrupt-heap-block"; |
| 454 const char kCorruptHeap[] = "/corrupt-heap"; | 454 const char kCorruptHeap[] = "/corrupt-heap"; |
| 455 #endif | 455 #endif |
| 456 | 456 |
| 457 if (!url.DomainIs(kCrashDomain)) | 457 if (!url.DomainIs(kCrashDomain)) |
| 458 return; | 458 return; |
| 459 | 459 |
| 460 if (!url.has_path()) | 460 if (!url.has_path()) |
| 461 return; | 461 return; |
| 462 | 462 |
| 463 std::string crash_type(url.path()); | 463 std::string crash_type(url.path().as_string()); |
| 464 if (crash_type == kHeapOverflow) { | 464 if (crash_type == kHeapOverflow) { |
| 465 LOG(ERROR) | 465 LOG(ERROR) |
| 466 << "Intentionally causing ASAN heap overflow" | 466 << "Intentionally causing ASAN heap overflow" |
| 467 << " because user navigated to " << url.spec(); | 467 << " because user navigated to " << url.spec(); |
| 468 base::debug::AsanHeapOverflow(); | 468 base::debug::AsanHeapOverflow(); |
| 469 } else if (crash_type == kHeapUnderflow) { | 469 } else if (crash_type == kHeapUnderflow) { |
| 470 LOG(ERROR) | 470 LOG(ERROR) |
| 471 << "Intentionally causing ASAN heap underflow" | 471 << "Intentionally causing ASAN heap underflow" |
| 472 << " because user navigated to " << url.spec(); | 472 << " because user navigated to " << url.spec(); |
| 473 base::debug::AsanHeapUnderflow(); | 473 base::debug::AsanHeapUnderflow(); |
| (...skipping 6110 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 6584 // event target. Potentially a Pepper plugin will receive the event. | 6584 // event target. Potentially a Pepper plugin will receive the event. |
| 6585 // In order to tell whether a plugin gets the last mouse event and which it | 6585 // In order to tell whether a plugin gets the last mouse event and which it |
| 6586 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets | 6586 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets |
| 6587 // the event, it will notify us via DidReceiveMouseEvent() and set itself as | 6587 // the event, it will notify us via DidReceiveMouseEvent() and set itself as |
| 6588 // |pepper_last_mouse_event_target_|. | 6588 // |pepper_last_mouse_event_target_|. |
| 6589 pepper_last_mouse_event_target_ = nullptr; | 6589 pepper_last_mouse_event_target_ = nullptr; |
| 6590 #endif | 6590 #endif |
| 6591 } | 6591 } |
| 6592 | 6592 |
| 6593 } // namespace content | 6593 } // namespace content |
| OLD | NEW |