Index: content/browser/security_exploit_browsertest.cc |
diff --git a/content/browser/security_exploit_browsertest.cc b/content/browser/security_exploit_browsertest.cc |
index fc648f0000f43757f7fcbaa7d7aa0b3048c96793..5efc83abaf6583c403cafb1e9259e4ce4ecbc430 100644 |
--- a/content/browser/security_exploit_browsertest.cc |
+++ b/content/browser/security_exploit_browsertest.cc |
@@ -58,10 +58,12 @@ RenderViewHostImpl* PrepareToDuplicateHosts(Shell* shell, |
// Now, simulate a link click coming from the renderer. |
GURL extension_url("https://bar.com/files/simple_page.html"); |
WebContentsImpl* wc = static_cast<WebContentsImpl*>(shell->web_contents()); |
+ RenderViewHostImpl* rvh = |
+ wc->GetRenderManagerForTesting()->current_host(); |
+ int64 frame_id = rvh->GetFrameIDForTesting( |
+ wc->GetFrameTree()->root()->frame_tree_node_id()); |
wc->RequestOpenURL( |
- shell->web_contents()->GetRenderViewHost(), extension_url, |
- Referrer(), CURRENT_TAB, wc->GetFrameTree()->root()->frame_id(), |
- false, true); |
+ rvh, extension_url, Referrer(), CURRENT_TAB, frame_id, false, true); |
// Since the navigation above requires a cross-process swap, there will be a |
// pending RenderViewHost. Ensure it exists and is in a different process |