Index: third_party/WebKit/Source/core/frame/DOMWindow.cpp |
diff --git a/third_party/WebKit/Source/core/frame/DOMWindow.cpp b/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
index 494b9c9621af541389e29938ff45d6541bfcfb77..792f78ec63ec7d50d63e5d060caea628a4c826f3 100644 |
--- a/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
+++ b/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
@@ -223,15 +223,17 @@ void DOMWindow::postMessage(PassRefPtr<SerializedScriptValue> message, |
->ToString()); |
if (MixedContentChecker::IsMixedContent(source_document->GetSecurityOrigin(), |
target_url)) { |
- UseCounter::Count(GetFrame(), UseCounter::kPostMessageFromSecureToInsecure); |
+ UseCounter::Count(source->GetFrame(), |
+ UseCounter::kPostMessageFromSecureToInsecure); |
} else if (MixedContentChecker::IsMixedContent( |
GetFrame()->GetSecurityContext()->GetSecurityOrigin(), |
source_document->Url())) { |
- UseCounter::Count(GetFrame(), UseCounter::kPostMessageFromInsecureToSecure); |
+ UseCounter::Count(source->GetFrame(), |
+ UseCounter::kPostMessageFromInsecureToSecure); |
if (MixedContentChecker::IsMixedContent( |
GetFrame()->Tree().Top().GetSecurityContext()->GetSecurityOrigin(), |
source_document->Url())) { |
- UseCounter::Count(GetFrame(), |
+ UseCounter::Count(source->GetFrame(), |
UseCounter::kPostMessageFromInsecureToSecureToplevel); |
} |
} |
@@ -240,7 +242,8 @@ void DOMWindow::postMessage(PassRefPtr<SerializedScriptValue> message, |
target_url, RedirectStatus::kNoRedirect, |
SecurityViolationReportingPolicy::kSuppressReporting)) { |
UseCounter::Count( |
- GetFrame(), UseCounter::kPostMessageOutgoingWouldBeBlockedByConnectSrc); |
+ source->GetFrame(), |
+ UseCounter::kPostMessageOutgoingWouldBeBlockedByConnectSrc); |
} |
MessageEvent* event = |