Avi Drissman | 4e1b7bc3 | 2022-09-15 14:03:50 | [diff] [blame] | 1 | // Copyright 2013 The Chromium Authors |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
danakj | c492bf8 | 2020-09-09 20:02:44 | [diff] [blame] | 5 | #include "content/browser/renderer_host/frame_tree.h" |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 6 | |
avi | b734894 | 2015-12-25 20:57:10 | [diff] [blame] | 7 | #include <stddef.h> |
| 8 | |
Peter Kasting | 1557e5f | 2025-01-28 01:14:08 | [diff] [blame] | 9 | #include <algorithm> |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 10 | #include <queue> |
Lukasz Anforowicz | 7bfb2e9 | 2017-11-22 17:19:45 | [diff] [blame] | 11 | #include <set> |
dcheng | 29f5a6c | 2015-08-31 21:43:27 | [diff] [blame] | 12 | #include <utility> |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 13 | |
Lei Zhang | de19767 | 2021-04-29 08:11:24 | [diff] [blame] | 14 | #include "base/containers/contains.h" |
Lei Zhang | 302bc3fa | 2025-06-04 20:10:34 | [diff] [blame] | 15 | #include "base/debug/crash_logging.h" |
Rakina Zata Amni | 8070040 | 2021-09-20 17:18:03 | [diff] [blame] | 16 | #include "base/debug/dump_without_crashing.h" |
Avi Drissman | adac2199 | 2023-01-11 23:46:39 | [diff] [blame] | 17 | #include "base/functional/bind.h" |
| 18 | #include "base/functional/callback.h" |
[email protected] | 20edca7 | 2014-08-14 10:27:53 | [diff] [blame] | 19 | #include "base/lazy_instance.h" |
dcheng | 9bfa516 | 2016-04-09 01:00:57 | [diff] [blame] | 20 | #include "base/memory/ptr_util.h" |
Ali Hijazi | e63cbaf6 | 2023-12-20 19:29:35 | [diff] [blame] | 21 | #include "base/memory/raw_ptr.h" |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 22 | #include "base/memory/safe_ref.h" |
Thomas Lukaszewicz | 0ef0f45f | 2025-02-18 17:59:42 | [diff] [blame] | 23 | #include "base/metrics/histogram_functions.h" |
Carlos Caballero | ede6f8c | 2021-01-28 11:01:50 | [diff] [blame] | 24 | #include "base/trace_event/optional_trace_event.h" |
Rakina Zata Amni | 4b1968d | 2021-09-09 03:29:47 | [diff] [blame] | 25 | #include "base/trace_event/typed_macros.h" |
Peter Kasting | 3b811ffd | 2025-01-29 22:20:16 | [diff] [blame] | 26 | #include "base/types/cxx23_from_range.h" |
Pavel Feldman | 2523472 | 2017-10-11 02:49:06 | [diff] [blame] | 27 | #include "base/unguessable_token.h" |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 28 | #include "content/browser/renderer_host/batched_proxy_ipc_sender.h" |
danakj | c492bf8 | 2020-09-09 20:02:44 | [diff] [blame] | 29 | #include "content/browser/renderer_host/navigation_controller_impl.h" |
| 30 | #include "content/browser/renderer_host/navigation_entry_impl.h" |
| 31 | #include "content/browser/renderer_host/navigation_request.h" |
| 32 | #include "content/browser/renderer_host/navigator.h" |
| 33 | #include "content/browser/renderer_host/navigator_delegate.h" |
Sreeja Kamishetty | 0be3b1b | 2021-08-12 17:04:15 | [diff] [blame] | 34 | #include "content/browser/renderer_host/page_impl.h" |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 35 | #include "content/browser/renderer_host/render_frame_host_delegate.h" |
danakj | c492bf8 | 2020-09-09 20:02:44 | [diff] [blame] | 36 | #include "content/browser/renderer_host/render_frame_host_factory.h" |
| 37 | #include "content/browser/renderer_host/render_frame_host_impl.h" |
| 38 | #include "content/browser/renderer_host/render_frame_proxy_host.h" |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 39 | #include "content/browser/renderer_host/render_view_host_delegate.h" |
[email protected] | 94d0cc1 | 2013-12-18 00:07:41 | [diff] [blame] | 40 | #include "content/browser/renderer_host/render_view_host_factory.h" |
| 41 | #include "content/browser/renderer_host/render_view_host_impl.h" |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 42 | #include "content/common/content_navigation_policy.h" |
japhet | 98e9bd8 | 2016-06-28 23:48:45 | [diff] [blame] | 43 | #include "content/common/content_switches_internal.h" |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 44 | #include "content/common/features.h" |
Tom Sepez | cc69c44 | 2025-07-17 02:00:30 | [diff] [blame] | 45 | #include "ipc/constants.mojom.h" |
Sreeja Kamishetty | 46f762c | 2021-02-05 07:52:46 | [diff] [blame] | 46 | #include "third_party/blink/public/common/features.h" |
Kevin McNee | 43fe829 | 2021-10-04 22:59:41 | [diff] [blame] | 47 | #include "third_party/blink/public/common/frame/frame_owner_element_type.h" |
Blink Reformat | a30d423 | 2018-04-07 15:31:06 | [diff] [blame] | 48 | #include "third_party/blink/public/common/frame/frame_policy.h" |
Sreeja Kamishetty | 0be3b1b | 2021-08-12 17:04:15 | [diff] [blame] | 49 | #include "third_party/blink/public/common/loader/loader_constants.h" |
Julie Jeongeun Kim | 70a2e4e | 2020-02-21 05:09:54 | [diff] [blame] | 50 | #include "third_party/blink/public/mojom/frame/frame_owner_properties.mojom.h" |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 51 | |
| 52 | namespace content { |
| 53 | |
| 54 | namespace { |
[email protected] | 20edca7 | 2014-08-14 10:27:53 | [diff] [blame] | 55 | |
Rakina Zata Amni | 4b1968d | 2021-09-09 03:29:47 | [diff] [blame] | 56 | using perfetto::protos::pbzero::ChromeTrackEvent; |
| 57 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 58 | // Helper function to collect SiteInstanceGroups involved in rendering a single |
| 59 | // FrameTree (which is a subset of SiteInstanceGroups in main frame's |
| 60 | // proxy_hosts_ because of openers). |
| 61 | std::set<SiteInstanceGroup*> CollectSiteInstanceGroups(FrameTree* tree) { |
| 62 | std::set<SiteInstanceGroup*> groups; |
Adithya Srinivasan | 0e980834 | 2022-12-13 18:25:07 | [diff] [blame] | 63 | for (FrameTreeNode* node : tree->Nodes()) |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 64 | groups.insert(node->current_frame_host()->GetSiteInstance()->group()); |
| 65 | return groups; |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 66 | } |
| 67 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 68 | // If |node| is the placeholder FrameTreeNode for an embedded frame tree, |
| 69 | // returns the inner tree's main frame's FrameTreeNode. Otherwise, returns null. |
| 70 | FrameTreeNode* GetInnerTreeMainFrameNode(FrameTreeNode* node) { |
Dominic Farolino | 377edb30 | 2021-07-29 05:57:18 | [diff] [blame] | 71 | FrameTreeNode* inner_main_frame_tree_node = FrameTreeNode::GloballyFindByID( |
| 72 | node->current_frame_host()->inner_tree_main_frame_tree_node_id()); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 73 | |
Kevin McNee | d459ad4 | 2022-09-12 19:24:59 | [diff] [blame] | 74 | if (inner_main_frame_tree_node) { |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 75 | DCHECK_NE(&node->frame_tree(), &inner_main_frame_tree_node->frame_tree()); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 76 | } |
| 77 | |
Kevin McNee | d459ad4 | 2022-09-12 19:24:59 | [diff] [blame] | 78 | return inner_main_frame_tree_node; |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 79 | } |
| 80 | |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 81 | } // namespace |
| 82 | |
vmpstr | 33895d99 | 2016-02-24 20:55:21 | [diff] [blame] | 83 | FrameTree::NodeIterator::NodeIterator(const NodeIterator& other) = default; |
| 84 | |
Fergal Daly | 55b6d72 | 2020-09-11 07:56:33 | [diff] [blame] | 85 | FrameTree::NodeIterator::~NodeIterator() = default; |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 86 | |
| 87 | FrameTree::NodeIterator& FrameTree::NodeIterator::operator++() { |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 88 | if (current_node_ != root_of_subtree_to_skip_) { |
Jayson Adams | 4db0bfe2 | 2021-07-15 19:24:07 | [diff] [blame] | 89 | // Reserve enough space in the queue to accommodate the nodes we're |
| 90 | // going to add, to avoid repeated resize calls. |
| 91 | queue_.reserve(queue_.size() + current_node_->child_count()); |
| 92 | |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 93 | for (size_t i = 0; i < current_node_->child_count(); ++i) { |
| 94 | FrameTreeNode* child = current_node_->child_at(i); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 95 | FrameTreeNode* inner_tree_main_ftn = GetInnerTreeMainFrameNode(child); |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 96 | if (should_descend_into_inner_trees_ && inner_tree_main_ftn) { |
| 97 | if (include_delegate_nodes_for_inner_frame_trees_) |
| 98 | queue_.push_back(child); |
| 99 | queue_.push_back(inner_tree_main_ftn); |
| 100 | } else { |
| 101 | queue_.push_back(child); |
| 102 | } |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 103 | } |
| 104 | |
| 105 | if (should_descend_into_inner_trees_) { |
Jayson Adams | 4db0bfe2 | 2021-07-15 19:24:07 | [diff] [blame] | 106 | auto unattached_nodes = |
| 107 | current_node_->current_frame_host() |
| 108 | ->delegate() |
| 109 | ->GetUnattachedOwnedNodes(current_node_->current_frame_host()); |
| 110 | |
| 111 | // Reserve enough space in the queue to accommodate the nodes we're |
| 112 | // going to add. |
| 113 | queue_.reserve(queue_.size() + unattached_nodes.size()); |
| 114 | |
| 115 | for (auto* unattached_node : unattached_nodes) { |
| 116 | queue_.push_back(unattached_node); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 117 | } |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 118 | } |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 119 | } |
| 120 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 121 | AdvanceNode(); |
| 122 | return *this; |
| 123 | } |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 124 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 125 | FrameTree::NodeIterator& FrameTree::NodeIterator::AdvanceSkippingChildren() { |
| 126 | AdvanceNode(); |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 127 | return *this; |
| 128 | } |
| 129 | |
| 130 | bool FrameTree::NodeIterator::operator==(const NodeIterator& rhs) const { |
| 131 | return current_node_ == rhs.current_node_; |
| 132 | } |
| 133 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 134 | void FrameTree::NodeIterator::AdvanceNode() { |
| 135 | if (!queue_.empty()) { |
| 136 | current_node_ = queue_.front(); |
Jayson Adams | 4db0bfe2 | 2021-07-15 19:24:07 | [diff] [blame] | 137 | queue_.pop_front(); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 138 | } else { |
| 139 | current_node_ = nullptr; |
| 140 | } |
| 141 | } |
| 142 | |
| 143 | FrameTree::NodeIterator::NodeIterator( |
Ali Hijazi | e63cbaf6 | 2023-12-20 19:29:35 | [diff] [blame] | 144 | const std::vector<raw_ptr<FrameTreeNode, VectorExperimental>>& |
| 145 | starting_nodes, |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 146 | const FrameTreeNode* root_of_subtree_to_skip, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 147 | bool should_descend_into_inner_trees, |
| 148 | bool include_delegate_nodes_for_inner_frame_trees) |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 149 | : current_node_(nullptr), |
| 150 | root_of_subtree_to_skip_(root_of_subtree_to_skip), |
| 151 | should_descend_into_inner_trees_(should_descend_into_inner_trees), |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 152 | include_delegate_nodes_for_inner_frame_trees_( |
| 153 | include_delegate_nodes_for_inner_frame_trees), |
Alan Zhao | adbc4f7 | 2024-11-08 01:59:36 | [diff] [blame] | 154 | queue_(base::from_range, starting_nodes) { |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 155 | // If `include_delegate_nodes_for_inner_frame_trees_` is true then |
| 156 | // `should_descend_into_inner_trees_` must be true. |
| 157 | DCHECK(!include_delegate_nodes_for_inner_frame_trees_ || |
| 158 | should_descend_into_inner_trees_); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 159 | AdvanceNode(); |
| 160 | } |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 161 | |
| 162 | FrameTree::NodeIterator FrameTree::NodeRange::begin() { |
W. James MacLean | ce3176d | 2019-10-18 04:01:45 | [diff] [blame] | 163 | // We shouldn't be attempting a frame tree traversal while the tree is |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 164 | // being constructed or destructed. |
Peter Kasting | 1557e5f | 2025-01-28 01:14:08 | [diff] [blame] | 165 | DCHECK(std::ranges::all_of(starting_nodes_, [](FrameTreeNode* ftn) { |
Peter Kasting | d568594 | 2022-09-02 17:52:17 | [diff] [blame] | 166 | return ftn->current_frame_host(); |
| 167 | })); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 168 | |
| 169 | return NodeIterator(starting_nodes_, root_of_subtree_to_skip_, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 170 | should_descend_into_inner_trees_, |
| 171 | include_delegate_nodes_for_inner_frame_trees_); |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 172 | } |
| 173 | |
| 174 | FrameTree::NodeIterator FrameTree::NodeRange::end() { |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 175 | return NodeIterator({}, nullptr, should_descend_into_inner_trees_, |
| 176 | include_delegate_nodes_for_inner_frame_trees_); |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 177 | } |
| 178 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 179 | FrameTree::NodeRange::NodeRange( |
Ali Hijazi | e63cbaf6 | 2023-12-20 19:29:35 | [diff] [blame] | 180 | const std::vector<raw_ptr<FrameTreeNode, VectorExperimental>>& |
| 181 | starting_nodes, |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 182 | const FrameTreeNode* root_of_subtree_to_skip, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 183 | bool should_descend_into_inner_trees, |
| 184 | bool include_delegate_nodes_for_inner_frame_trees) |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 185 | : starting_nodes_(starting_nodes), |
| 186 | root_of_subtree_to_skip_(root_of_subtree_to_skip), |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 187 | should_descend_into_inner_trees_(should_descend_into_inner_trees), |
| 188 | include_delegate_nodes_for_inner_frame_trees_( |
| 189 | include_delegate_nodes_for_inner_frame_trees) {} |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 190 | |
| 191 | FrameTree::NodeRange::NodeRange(const NodeRange&) = default; |
| 192 | FrameTree::NodeRange::~NodeRange() = default; |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 193 | |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 194 | FrameTree::FrameTree( |
| 195 | BrowserContext* browser_context, |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 196 | Delegate* delegate, |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 197 | NavigationControllerDelegate* navigation_controller_delegate, |
| 198 | NavigatorDelegate* navigator_delegate, |
| 199 | RenderFrameHostDelegate* render_frame_delegate, |
| 200 | RenderViewHostDelegate* render_view_delegate, |
| 201 | RenderWidgetHostDelegate* render_widget_delegate, |
Sreeja Kamishetty | 837a1040 | 2021-04-23 12:41:59 | [diff] [blame] | 202 | RenderFrameHostManager::Delegate* manager_delegate, |
Jeremy Roman | 2d8dfe13 | 2021-07-06 20:51:26 | [diff] [blame] | 203 | PageDelegate* page_delegate, |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 204 | Type type) |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 205 | : delegate_(delegate), |
| 206 | render_frame_delegate_(render_frame_delegate), |
[email protected] | 92404c6 | 2013-12-04 16:40:46 | [diff] [blame] | 207 | render_view_delegate_(render_view_delegate), |
[email protected] | fa944cb8 | 2013-11-15 17:51:21 | [diff] [blame] | 208 | render_widget_delegate_(render_widget_delegate), |
| 209 | manager_delegate_(manager_delegate), |
Jeremy Roman | 2d8dfe13 | 2021-07-06 20:51:26 | [diff] [blame] | 210 | page_delegate_(page_delegate), |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 211 | navigator_(browser_context, |
| 212 | *this, |
| 213 | navigator_delegate, |
| 214 | navigation_controller_delegate), |
Harkiran Bolaria | 16f2c48d | 2022-04-22 12:39:57 | [diff] [blame] | 215 | type_(type), |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 216 | root_(*this, |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 217 | nullptr, |
| 218 | // The top-level frame must always be in a |
| 219 | // document scope. |
| 220 | blink::mojom::TreeScopeType::kDocument, |
| 221 | false, |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 222 | blink::mojom::FrameOwnerProperties(), |
| 223 | blink::FrameOwnerElementType::kNone, |
| 224 | blink::FramePolicy()) {} |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 225 | |
| 226 | FrameTree::~FrameTree() { |
Takashi Toyoshima | ea534ef2 | 2021-07-21 03:27:59 | [diff] [blame] | 227 | is_being_destroyed_ = true; |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 228 | #if DCHECK_IS_ON() |
| 229 | DCHECK(was_shut_down_); |
| 230 | #endif |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 231 | } |
| 232 | |
Sharon Yang | ed88454 | 2023-02-02 17:33:44 | [diff] [blame] | 233 | void FrameTree::ForEachRenderViewHost( |
| 234 | base::FunctionRef<void(RenderViewHostImpl*)> on_host) { |
| 235 | if (speculative_render_view_host_) { |
| 236 | on_host(speculative_render_view_host_.get()); |
| 237 | } |
| 238 | |
| 239 | for (auto& rvh : render_view_host_map_) { |
| 240 | on_host(rvh.second); |
| 241 | } |
| 242 | } |
| 243 | |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 244 | void FrameTree::MakeSpeculativeRVHCurrent() { |
| 245 | CHECK(speculative_render_view_host_); |
| 246 | |
| 247 | // The existing RenderViewHost needs to be unregistered first. |
| 248 | // Speculative RenderViewHosts are only used for same-SiteInstanceGroup |
| 249 | // navigations, so there should be a RenderViewHost of the same |
| 250 | // SiteInstanceGroup already in the tree. |
| 251 | RenderViewHostMapId speculative_id = |
| 252 | speculative_render_view_host_->rvh_map_id(); |
| 253 | auto it = render_view_host_map_.find(speculative_id); |
| 254 | CHECK(it != render_view_host_map_.end()); |
| 255 | UnregisterRenderViewHost(speculative_id, it->second); |
| 256 | |
| 257 | speculative_render_view_host_->set_is_speculative(false); |
| 258 | RegisterRenderViewHost(speculative_id, speculative_render_view_host_.get()); |
| 259 | speculative_render_view_host_.reset(); |
| 260 | } |
| 261 | |
Avi Drissman | bd15364 | 2024-09-03 18:58:05 | [diff] [blame] | 262 | FrameTreeNode* FrameTree::FindByID(FrameTreeNodeId frame_tree_node_id) { |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 263 | for (FrameTreeNode* node : Nodes()) { |
| 264 | if (node->frame_tree_node_id() == frame_tree_node_id) |
| 265 | return node; |
| 266 | } |
| 267 | return nullptr; |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 268 | } |
| 269 | |
nasko | 479ea5a | 2015-02-14 00:03:04 | [diff] [blame] | 270 | FrameTreeNode* FrameTree::FindByRoutingID(int process_id, int routing_id) { |
dmazzoni | 0b5d248 | 2014-09-10 19:45:57 | [diff] [blame] | 271 | RenderFrameHostImpl* render_frame_host = |
| 272 | RenderFrameHostImpl::FromID(process_id, routing_id); |
| 273 | if (render_frame_host) { |
| 274 | FrameTreeNode* result = render_frame_host->frame_tree_node(); |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 275 | if (this == &result->frame_tree()) |
dmazzoni | 0b5d248 | 2014-09-10 19:45:57 | [diff] [blame] | 276 | return result; |
| 277 | } |
| 278 | |
| 279 | RenderFrameProxyHost* render_frame_proxy_host = |
| 280 | RenderFrameProxyHost::FromID(process_id, routing_id); |
| 281 | if (render_frame_proxy_host) { |
| 282 | FrameTreeNode* result = render_frame_proxy_host->frame_tree_node(); |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 283 | if (this == &result->frame_tree()) |
dmazzoni | 0b5d248 | 2014-09-10 19:45:57 | [diff] [blame] | 284 | return result; |
| 285 | } |
| 286 | |
creis | 6a93a81 | 2015-04-24 23:13:17 | [diff] [blame] | 287 | return nullptr; |
| 288 | } |
| 289 | |
| 290 | FrameTreeNode* FrameTree::FindByName(const std::string& name) { |
| 291 | if (name.empty()) |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 292 | return &root_; |
creis | 6a93a81 | 2015-04-24 23:13:17 | [diff] [blame] | 293 | |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 294 | for (FrameTreeNode* node : Nodes()) { |
| 295 | if (node->frame_name() == name) |
| 296 | return node; |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 297 | } |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 298 | |
| 299 | return nullptr; |
| 300 | } |
| 301 | |
| 302 | FrameTree::NodeRange FrameTree::Nodes() { |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 303 | return NodesExceptSubtree(nullptr); |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 304 | } |
| 305 | |
kenrb | 61b6c25 | 2016-03-22 17:37:15 | [diff] [blame] | 306 | FrameTree::NodeRange FrameTree::SubtreeNodes(FrameTreeNode* subtree_root) { |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 307 | return NodeRange({subtree_root}, nullptr, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 308 | /*should_descend_into_inner_trees=*/false, |
| 309 | /*include_delegate_nodes_for_inner_frame_trees=*/false); |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 310 | } |
| 311 | |
Kevin McNee | 53f0b2d | 2021-11-02 18:00:45 | [diff] [blame] | 312 | FrameTree::NodeRange FrameTree::NodesIncludingInnerTreeNodes() { |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 313 | return NodeRange({&root_}, nullptr, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 314 | /*should_descend_into_inner_trees=*/true, |
| 315 | /*include_delegate_nodes_for_inner_frame_trees=*/false); |
Kevin McNee | 53f0b2d | 2021-11-02 18:00:45 | [diff] [blame] | 316 | } |
| 317 | |
Sreeja Kamishetty | d64b993d | 2022-02-14 12:04:42 | [diff] [blame] | 318 | std::vector<FrameTreeNode*> FrameTree::CollectNodesForIsLoading() { |
| 319 | FrameTree::NodeRange node_range = NodesIncludingInnerTreeNodes(); |
| 320 | FrameTree::NodeIterator node_iter = node_range.begin(); |
| 321 | std::vector<FrameTreeNode*> nodes; |
| 322 | |
Daniel Cheng | 4d54f0a | 2025-05-26 22:59:12 | [diff] [blame] | 323 | CHECK(node_iter != node_range.end()); |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 324 | FrameTree* root_loading_tree = root_.frame_tree().LoadingTree(); |
Sreeja Kamishetty | d64b993d | 2022-02-14 12:04:42 | [diff] [blame] | 325 | while (node_iter != node_range.end()) { |
| 326 | // Skip over frame trees and children which belong to inner web contents |
| 327 | // i.e., when nodes doesn't point to the same loading frame tree. |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 328 | if ((*node_iter)->frame_tree().LoadingTree() != root_loading_tree) { |
Sreeja Kamishetty | d64b993d | 2022-02-14 12:04:42 | [diff] [blame] | 329 | node_iter.AdvanceSkippingChildren(); |
| 330 | } else { |
| 331 | nodes.push_back(*node_iter); |
| 332 | ++node_iter; |
| 333 | } |
| 334 | } |
| 335 | return nodes; |
| 336 | } |
| 337 | |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 338 | FrameTree::NodeRange FrameTree::SubtreeAndInnerTreeNodes( |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 339 | RenderFrameHostImpl* parent, |
| 340 | bool include_delegate_nodes_for_inner_frame_trees) { |
Ali Hijazi | e63cbaf6 | 2023-12-20 19:29:35 | [diff] [blame] | 341 | std::vector<raw_ptr<FrameTreeNode, VectorExperimental>> starting_nodes; |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 342 | starting_nodes.reserve(parent->child_count()); |
| 343 | for (size_t i = 0; i < parent->child_count(); ++i) { |
| 344 | FrameTreeNode* child = parent->child_at(i); |
| 345 | FrameTreeNode* inner_tree_main_ftn = GetInnerTreeMainFrameNode(child); |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 346 | if (inner_tree_main_ftn) { |
| 347 | if (include_delegate_nodes_for_inner_frame_trees) |
| 348 | starting_nodes.push_back(child); |
| 349 | starting_nodes.push_back(inner_tree_main_ftn); |
| 350 | } else { |
| 351 | starting_nodes.push_back(child); |
| 352 | } |
Kevin McNee | 5f59438 | 2021-05-06 23:18:23 | [diff] [blame] | 353 | } |
| 354 | const std::vector<FrameTreeNode*> unattached_owned_nodes = |
| 355 | parent->delegate()->GetUnattachedOwnedNodes(parent); |
| 356 | starting_nodes.insert(starting_nodes.end(), unattached_owned_nodes.begin(), |
| 357 | unattached_owned_nodes.end()); |
| 358 | return NodeRange(starting_nodes, nullptr, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 359 | /* should_descend_into_inner_trees */ true, |
| 360 | include_delegate_nodes_for_inner_frame_trees); |
kenrb | 61b6c25 | 2016-03-22 17:37:15 | [diff] [blame] | 361 | } |
| 362 | |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 363 | FrameTree::NodeRange FrameTree::NodesExceptSubtree(FrameTreeNode* node) { |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 364 | return NodeRange({&root_}, node, /*should_descend_into_inner_trees=*/false, |
Dave Tapuska | dda303d | 2022-10-04 16:56:48 | [diff] [blame] | 365 | /*include_delegate_nodes_for_inner_frame_trees=*/false); |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 366 | } |
| 367 | |
Sreeja Kamishetty | d64b993d | 2022-02-14 12:04:42 | [diff] [blame] | 368 | FrameTree* FrameTree::LoadingTree() { |
| 369 | // We return the delegate's loading frame tree to infer loading related |
| 370 | // states. |
| 371 | return delegate_->LoadingTree(); |
| 372 | } |
| 373 | |
Lucas Furukawa Gadani | 9912582 | 2019-01-03 15:41:49 | [diff] [blame] | 374 | FrameTreeNode* FrameTree::AddFrame( |
Alexander Timin | 381e7e18 | 2020-04-28 19:04:03 | [diff] [blame] | 375 | RenderFrameHostImpl* parent, |
Balazs Engedy | ba034e7 | 2017-10-27 22:26:28 | [diff] [blame] | 376 | int process_id, |
| 377 | int new_routing_id, |
danakj | 0bdfacd | 2021-01-20 19:27:18 | [diff] [blame] | 378 | mojo::PendingAssociatedRemote<mojom::Frame> frame_remote, |
Oksana Zhuravlova | fee097c | 2019-07-26 17:01:30 | [diff] [blame] | 379 | mojo::PendingReceiver<blink::mojom::BrowserInterfaceBroker> |
| 380 | browser_interface_broker_receiver, |
Antonio Sartori | db967c5 | 2021-01-20 09:54:30 | [diff] [blame] | 381 | blink::mojom::PolicyContainerBindParamsPtr policy_container_bind_params, |
Dominic Farolino | 12e06d7 | 2022-08-05 02:29:49 | [diff] [blame] | 382 | mojo::PendingAssociatedReceiver<blink::mojom::AssociatedInterfaceProvider> |
| 383 | associated_interface_provider_receiver, |
Antonio Gomes | 9d5c1ef | 2020-04-30 20:56:41 | [diff] [blame] | 384 | blink::mojom::TreeScopeType scope, |
Balazs Engedy | ba034e7 | 2017-10-27 22:26:28 | [diff] [blame] | 385 | const std::string& frame_name, |
| 386 | const std::string& frame_unique_name, |
Lukasz Anforowicz | 7bfb2e9 | 2017-11-22 17:19:45 | [diff] [blame] | 387 | bool is_created_by_script, |
Chris Hamilton | 3ff6ed0e | 2021-02-19 03:54:04 | [diff] [blame] | 388 | const blink::LocalFrameToken& frame_token, |
Balazs Engedy | ba034e7 | 2017-10-27 22:26:28 | [diff] [blame] | 389 | const base::UnguessableToken& devtools_frame_token, |
Daniel Cheng | 284c3894 | 2022-09-22 23:30:34 | [diff] [blame] | 390 | const blink::DocumentToken& document_token, |
Luna Lu | c3fdacdf | 2017-11-08 04:48:53 | [diff] [blame] | 391 | const blink::FramePolicy& frame_policy, |
Julie Jeongeun Kim | 70a2e4e | 2020-02-21 05:09:54 | [diff] [blame] | 392 | const blink::mojom::FrameOwnerProperties& frame_owner_properties, |
Ehsan Karamad | 192a8da | 2018-10-21 03:48:08 | [diff] [blame] | 393 | bool was_discarded, |
Kevin McNee | 43fe829 | 2021-10-04 22:59:41 | [diff] [blame] | 394 | blink::FrameOwnerElementType owner_type, |
| 395 | bool is_dummy_frame_for_inner_tree) { |
Tom Sepez | cc69c44 | 2025-07-17 02:00:30 | [diff] [blame] | 396 | CHECK_NE(new_routing_id, IPC::mojom::kRoutingIdNone); |
Jeremy Roman | c0c69be | 2023-11-21 19:14:52 | [diff] [blame] | 397 | // Normally this path is for blink adding a child local frame. But fenced |
| 398 | // frames add a dummy child frame that never gets a corresponding |
| 399 | // RenderFrameImpl in any renderer process, and therefore its `frame_remote` |
| 400 | // is invalid. Also its RenderFrameHostImpl is exempt from having |
| 401 | // `RenderFrameCreated()` called on it (see later in this method, as well as |
| 402 | // `WebContentsObserverConsistencyChecker::RenderFrameHostChanged()`). |
Kevin McNee | 43fe829 | 2021-10-04 22:59:41 | [diff] [blame] | 403 | DCHECK_NE(frame_remote.is_valid(), is_dummy_frame_for_inner_tree); |
| 404 | DCHECK_NE(browser_interface_broker_receiver.is_valid(), |
| 405 | is_dummy_frame_for_inner_tree); |
Dominic Farolino | 12e06d7 | 2022-08-05 02:29:49 | [diff] [blame] | 406 | DCHECK_NE(associated_interface_provider_receiver.is_valid(), |
| 407 | is_dummy_frame_for_inner_tree); |
nick | 8814e65 | 2015-12-18 01:44:12 | [diff] [blame] | 408 | |
dgrogan | fb22f9a | 2014-10-20 21:32:32 | [diff] [blame] | 409 | // A child frame always starts with an initial empty document, which means |
| 410 | // it is in the same SiteInstance as the parent frame. Ensure that the process |
| 411 | // which requested a child frame to be added is the same as the process of the |
| 412 | // parent node. |
Emily Andrews | d15fd76 | 2024-12-10 20:41:54 | [diff] [blame] | 413 | CHECK_EQ(parent->GetProcess()->GetDeprecatedID(), process_id); |
dgrogan | fb22f9a | 2014-10-20 21:32:32 | [diff] [blame] | 414 | |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 415 | std::unique_ptr<FrameTreeNode> new_node = base::WrapUnique( |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 416 | new FrameTreeNode(*this, parent, scope, is_created_by_script, |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 417 | frame_owner_properties, owner_type, frame_policy)); |
iclelland | 098da75 | 2017-06-28 13:46:50 | [diff] [blame] | 418 | |
| 419 | // Set sandbox flags and container policy and make them effective immediately, |
Charlie Hu | 5130d25e | 2021-03-05 21:53:39 | [diff] [blame] | 420 | // since initial sandbox flags and permissions policy should apply to the |
| 421 | // initial empty document in the frame. This needs to happen before the call |
| 422 | // to AddChild so that the effective policy is sent to any newly-created |
Dave Tapuska | 2402595f | 2022-08-03 16:24:21 | [diff] [blame] | 423 | // `blink::RemoteFrame` objects when the RenderFrameHost is created. |
Charlie Hu | 5ffc015 | 2019-12-06 15:59:53 | [diff] [blame] | 424 | // SetPendingFramePolicy is necessary here because next navigation on this |
| 425 | // frame will need the value of pending frame policy instead of effective |
| 426 | // frame policy. |
Ian Clelland | cdc4f31 | 2017-10-13 22:24:12 | [diff] [blame] | 427 | new_node->SetPendingFramePolicy(frame_policy); |
iclelland | 098da75 | 2017-06-28 13:46:50 | [diff] [blame] | 428 | |
Shubhie Panicker | ddf2a4e | 2018-03-06 00:09:06 | [diff] [blame] | 429 | if (was_discarded) |
| 430 | new_node->set_was_discarded(); |
| 431 | |
iclelland | 098da75 | 2017-06-28 13:46:50 | [diff] [blame] | 432 | // Add the new node to the FrameTree, creating the RenderFrameHost. |
Harkiran Bolaria | 0b3bdef0 | 2022-03-10 13:04:40 | [diff] [blame] | 433 | FrameTreeNode* added_node = parent->AddChild( |
| 434 | std::move(new_node), new_routing_id, std::move(frame_remote), frame_token, |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 435 | document_token, devtools_frame_token, frame_policy, frame_name, |
| 436 | frame_unique_name); |
nick | 8814e65 | 2015-12-18 01:44:12 | [diff] [blame] | 437 | |
Garrett Tanzer | 34cb92fe | 2022-09-28 17:50:54 | [diff] [blame] | 438 | added_node->SetFencedFramePropertiesIfNeeded(); |
shivanigithub | 4cd016a | 2021-09-20 21:10:30 | [diff] [blame] | 439 | |
Kevin McNee | 43fe829 | 2021-10-04 22:59:41 | [diff] [blame] | 440 | if (browser_interface_broker_receiver.is_valid()) { |
| 441 | added_node->current_frame_host()->BindBrowserInterfaceBrokerReceiver( |
| 442 | std::move(browser_interface_broker_receiver)); |
| 443 | } |
Oksana Zhuravlova | fee097c | 2019-07-26 17:01:30 | [diff] [blame] | 444 | |
Antonio Sartori | db967c5 | 2021-01-20 09:54:30 | [diff] [blame] | 445 | if (policy_container_bind_params) { |
Antonio Sartori | a1fd143 | 2020-11-25 09:10:20 | [diff] [blame] | 446 | added_node->current_frame_host()->policy_container_host()->Bind( |
Antonio Sartori | db967c5 | 2021-01-20 09:54:30 | [diff] [blame] | 447 | std::move(policy_container_bind_params)); |
Antonio Sartori | a1fd143 | 2020-11-25 09:10:20 | [diff] [blame] | 448 | } |
| 449 | |
Dominic Farolino | 12e06d7 | 2022-08-05 02:29:49 | [diff] [blame] | 450 | if (associated_interface_provider_receiver.is_valid()) { |
| 451 | added_node->current_frame_host()->BindAssociatedInterfaceProviderReceiver( |
| 452 | std::move(associated_interface_provider_receiver)); |
| 453 | } |
| 454 | |
nasko | 03ecfad | 2016-08-02 00:54:06 | [diff] [blame] | 455 | // The last committed NavigationEntry may have a FrameNavigationEntry with the |
| 456 | // same |frame_unique_name|, since we don't remove FrameNavigationEntries if |
| 457 | // their frames are deleted. If there is a stale one, remove it to avoid |
| 458 | // conflicts on future updates. |
Fergal Daly | 09d6c76 | 2020-05-29 02:05:18 | [diff] [blame] | 459 | NavigationEntryImpl* last_committed_entry = static_cast<NavigationEntryImpl*>( |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 460 | navigator_.controller().GetLastCommittedEntry()); |
Lukasz Anforowicz | 7bfb2e9 | 2017-11-22 17:19:45 | [diff] [blame] | 461 | if (last_committed_entry) { |
| 462 | last_committed_entry->RemoveEntryForFrame( |
| 463 | added_node, /* only_if_different_position = */ true); |
| 464 | } |
nasko | 03ecfad | 2016-08-02 00:54:06 | [diff] [blame] | 465 | |
nick | 8814e65 | 2015-12-18 01:44:12 | [diff] [blame] | 466 | // Now that the new node is part of the FrameTree and has a RenderFrameHost, |
| 467 | // we can announce the creation of the initial RenderFrame which already |
| 468 | // exists in the renderer process. |
Sreeja Kamishetty | 5b69962 | 2021-01-22 12:54:08 | [diff] [blame] | 469 | // For consistency with navigating to a new RenderFrameHost case, we dispatch |
| 470 | // RenderFrameCreated before RenderFrameHostChanged. |
Kevin McNee | 43fe829 | 2021-10-04 22:59:41 | [diff] [blame] | 471 | if (!is_dummy_frame_for_inner_tree) { |
Jeremy Roman | c0c69be | 2023-11-21 19:14:52 | [diff] [blame] | 472 | // The outer dummy FrameTreeNode for fenced frames does not have a live |
| 473 | // RenderFrame in the renderer process. |
Fergal Daly | f9ea35c | 2020-12-11 15:26:01 | [diff] [blame] | 474 | added_node->current_frame_host()->RenderFrameCreated(); |
Ehsan Karamad | 44fc7211 | 2019-02-26 18:15:47 | [diff] [blame] | 475 | } |
Sreeja Kamishetty | 5b69962 | 2021-01-22 12:54:08 | [diff] [blame] | 476 | |
| 477 | // Notify the delegate of the creation of the current RenderFrameHost. |
| 478 | // This is only for subframes, as the main frame case is taken care of by |
| 479 | // WebContentsImpl::Init. |
| 480 | manager_delegate_->NotifySwappedFromRenderManager( |
Dave Tapuska | e45d6fd | 2021-09-29 17:03:59 | [diff] [blame] | 481 | nullptr, added_node->current_frame_host()); |
Lucas Furukawa Gadani | 9912582 | 2019-01-03 15:41:49 | [diff] [blame] | 482 | return added_node; |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 483 | } |
| 484 | |
[email protected] | 58faf94 | 2014-02-20 21:03:58 | [diff] [blame] | 485 | void FrameTree::RemoveFrame(FrameTreeNode* child) { |
Alexander Timin | 381e7e18 | 2020-04-28 19:04:03 | [diff] [blame] | 486 | RenderFrameHostImpl* parent = child->parent(); |
[email protected] | 58faf94 | 2014-02-20 21:03:58 | [diff] [blame] | 487 | if (!parent) { |
Peter Boström | fc7ddc18 | 2024-10-31 19:37:21 | [diff] [blame] | 488 | NOTREACHED() << "Unexpected RemoveFrame call for main frame."; |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 489 | } |
| 490 | |
Alexander Timin | 381e7e18 | 2020-04-28 19:04:03 | [diff] [blame] | 491 | parent->RemoveChild(child); |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 492 | } |
| 493 | |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 494 | void FrameTree::CreateProxiesForSiteInstanceGroup( |
Harkiran Bolaria | 2912a6b3 | 2022-02-22 16:43:45 | [diff] [blame] | 495 | FrameTreeNode* source, |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 496 | SiteInstanceGroup* site_instance_group, |
Harkiran Bolaria | 2912a6b3 | 2022-02-22 16:43:45 | [diff] [blame] | 497 | const scoped_refptr<BrowsingContextState>& |
Alex Moshchuk | d0d759c2 | 2025-05-09 18:18:35 | [diff] [blame] | 498 | source_new_browsing_context_state, |
| 499 | const std::optional<base::UnguessableToken>& navigation_metrics_token) { |
Peilin Wang | fc54321 | 2024-03-27 16:17:21 | [diff] [blame] | 500 | // Will be instantiated with the root proxy later and passed to |
| 501 | // `CreateRenderFrameProxy()` to batch create proxies for child frames. |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 502 | std::unique_ptr<BatchedProxyIPCSender> batched_proxy_ipc_sender; |
| 503 | |
alexmos | 5872904 | 2015-06-18 23:20:00 | [diff] [blame] | 504 | if (!source || !source->IsMainFrame()) { |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 505 | RenderViewHostImpl* render_view_host = |
| 506 | GetRenderViewHost(site_instance_group).get(); |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 507 | if (render_view_host) { |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 508 | root()->render_manager()->EnsureRenderViewInitialized( |
Alex Moshchuk | d0d759c2 | 2025-05-09 18:18:35 | [diff] [blame] | 509 | render_view_host, site_instance_group, navigation_metrics_token); |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 510 | } else { |
Harkiran Bolaria | 2912a6b3 | 2022-02-22 16:43:45 | [diff] [blame] | 511 | // Due to the check above, we are creating either an opener proxy (when |
| 512 | // source is null) or a main frame proxy due to a subframe navigation |
| 513 | // (when source is not a main frame). In the former case, we should use |
| 514 | // root's current BrowsingContextState, while in the latter case we should |
| 515 | // use BrowsingContextState from the main RenderFrameHost of the subframe |
Dave Tapuska | 2cf1f53 | 2022-08-10 15:30:49 | [diff] [blame] | 516 | // being navigated. We want to ensure that the `blink::WebView` is created |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 517 | // in the right SiteInstanceGroup if it doesn't exist, before creating the |
Dave Tapuska | 2cf1f53 | 2022-08-10 15:30:49 | [diff] [blame] | 518 | // other proxies; if the `blink::WebView` doesn't exist, the only way to |
| 519 | // do this is to also create a proxy for the main frame as well. |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 520 | const scoped_refptr<BrowsingContextState>& root_browsing_context_state = |
Harkiran Bolaria | 2912a6b3 | 2022-02-22 16:43:45 | [diff] [blame] | 521 | source ? source->parent()->GetMainFrame()->browsing_context_state() |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 522 | : root()->current_frame_host()->browsing_context_state(); |
| 523 | |
Alison Gale | 770f3fc | 2024-04-27 00:39:58 | [diff] [blame] | 524 | // TODO(crbug.com/40248300): Batch main frame proxy creation and |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 525 | // pass an instance of `BatchedProxyIPCSender` here instead of nullptr. |
| 526 | root()->render_manager()->CreateRenderFrameProxy( |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 527 | site_instance_group, root_browsing_context_state, |
Alex Moshchuk | d0d759c2 | 2025-05-09 18:18:35 | [diff] [blame] | 528 | navigation_metrics_token, |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 529 | /*batched_proxy_ipc_sender=*/nullptr); |
| 530 | |
| 531 | // We only need to use `BatchedProxyIPCSender` when navigating to a new |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 532 | // SiteInstanceGroup. Proxies do not need to be created when navigating to |
| 533 | // a SiteInstanceGroup that has already been encountered, because site |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 534 | // isolation would guarantee that all nodes already have either proxies |
| 535 | // or real frames. Due to the check above, the `render_view_host` does |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 536 | // not exist here, which means we have not seen this SiteInstanceGroup |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 537 | // before, so we instantiate `batched_proxy_ipc_sender` to consolidate |
| 538 | // IPCs for proxy creation. |
Peilin Wang | fc54321 | 2024-03-27 16:17:21 | [diff] [blame] | 539 | base::SafeRef<RenderFrameProxyHost> root_proxy = |
| 540 | root_browsing_context_state |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 541 | ->GetRenderFrameProxyHost(site_instance_group) |
Peilin Wang | fc54321 | 2024-03-27 16:17:21 | [diff] [blame] | 542 | ->GetSafeRef(); |
Alex Moshchuk | d0d759c2 | 2025-05-09 18:18:35 | [diff] [blame] | 543 | batched_proxy_ipc_sender = std::make_unique<BatchedProxyIPCSender>( |
| 544 | std::move(root_proxy), navigation_metrics_token); |
[email protected] | 82307f6b | 2014-08-07 03:30:12 | [diff] [blame] | 545 | } |
| 546 | } |
| 547 | |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 548 | // Check whether we're in an inner delegate and the |site_instance_group| |
| 549 | // corresponds to the outer delegate. Subframe proxies aren't needed if this |
| 550 | // is the case. |
Sharon Yang | 88f064ca | 2023-03-24 16:25:18 | [diff] [blame] | 551 | bool is_site_instance_group_for_outer_delegate = false; |
Alex Moshchuk | 1226b15 | 2019-11-08 18:23:45 | [diff] [blame] | 552 | RenderFrameProxyHost* outer_delegate_proxy = |
| 553 | root()->render_manager()->GetProxyToOuterDelegate(); |
| 554 | if (outer_delegate_proxy) { |
Sharon Yang | 88f064ca | 2023-03-24 16:25:18 | [diff] [blame] | 555 | is_site_instance_group_for_outer_delegate = |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 556 | (site_instance_group == outer_delegate_proxy->site_instance_group()); |
Alex Moshchuk | 1226b15 | 2019-11-08 18:23:45 | [diff] [blame] | 557 | } |
| 558 | |
nasko | e6edde3 | 2014-10-17 15:36:48 | [diff] [blame] | 559 | // Proxies are created in the FrameTree in response to a node navigating to a |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 560 | // new SiteInstanceGroup. Since |source|'s navigation will replace the |
| 561 | // currently loaded document, the entire subtree under |source| will be |
| 562 | // removed, and thus proxy creation is skipped for all nodes in that subtree. |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 563 | // |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 564 | // However, a proxy *is* needed for the |source| node if it is |
| 565 | // cross-SiteInstanceGroup from the current node. This lets cross-process |
| 566 | // navigations in |source| start with a proxy and follow a remote-to-local |
| 567 | // transition, which avoids race conditions in cases where other navigations |
| 568 | // need to reference |source| before it commits. See https://crbug.com/756790 |
| 569 | // for more background. Therefore, NodesExceptSubtree(source) will include |
| 570 | // |source| in the nodes traversed (see NodeIterator::operator++). |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 571 | for (FrameTreeNode* node : NodesExceptSubtree(source)) { |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 572 | // If a new frame is created in the current SiteInstanceGroup, other frames |
| 573 | // in that SiteInstanceGroup don't need a proxy for the new frame. |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 574 | RenderFrameHostImpl* current_host = |
| 575 | node->render_manager()->current_frame_host(); |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 576 | SiteInstanceGroup* current_group = current_host->GetSiteInstance()->group(); |
| 577 | |
| 578 | // Check that the proxy is for a different SiteInstanceGroup. This ensures |
| 579 | // that a navigation within a SiteInstanceGroup does not cause proxies to be |
| 580 | // created. That then allows the Blink side to do a local to local frame |
| 581 | // transition within the same process. |
| 582 | if (current_group != site_instance_group) { |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 583 | if (node == source && !current_host->IsRenderFrameLive()) { |
Fergal Daly | 6de62f5 | 2020-10-14 01:56:44 | [diff] [blame] | 584 | // We don't create a proxy at |source| when the current RenderFrameHost |
| 585 | // isn't live. This is because either (1) the speculative |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 586 | // RenderFrameHost will be committed immediately, and the proxy |
Fergal Daly | 6de62f5 | 2020-10-14 01:56:44 | [diff] [blame] | 587 | // destroyed right away, in GetFrameHostForNavigation, which makes the |
| 588 | // races above impossible, or (2) the early commit will be skipped due |
| 589 | // to ShouldSkipEarlyCommitPendingForCrashedFrame, in which case the |
| 590 | // proxy for |source| *is* needed, but it will be created later in |
| 591 | // CreateProxiesForNewRenderFrameHost. |
| 592 | // |
| 593 | // TODO(fergal): Consider creating a proxy for |source| here rather than |
| 594 | // in CreateProxiesForNewRenderFrameHost for case (2) above. |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 595 | continue; |
| 596 | } |
Alex Moshchuk | 1226b15 | 2019-11-08 18:23:45 | [diff] [blame] | 597 | |
| 598 | // Do not create proxies for subframes in the outer delegate's |
Sharon Yang | 88f064ca | 2023-03-24 16:25:18 | [diff] [blame] | 599 | // SiteInstanceGroup, since there is no need to expose these subframes to |
| 600 | // the outer delegate. See also comments in CreateProxiesForChildFrame() |
| 601 | // and https://crbug.com/1013553. |
| 602 | if (!node->IsMainFrame() && is_site_instance_group_for_outer_delegate) { |
Alex Moshchuk | 1226b15 | 2019-11-08 18:23:45 | [diff] [blame] | 603 | continue; |
Sharon Yang | 88f064ca | 2023-03-24 16:25:18 | [diff] [blame] | 604 | } |
Alex Moshchuk | 1226b15 | 2019-11-08 18:23:45 | [diff] [blame] | 605 | |
Harkiran Bolaria | 2912a6b3 | 2022-02-22 16:43:45 | [diff] [blame] | 606 | // If |node| is the FrameTreeNode being navigated, we use |
| 607 | // |browsing_context_state| (as BrowsingContextState might change for |
| 608 | // cross-BrowsingInstance navigations). Otherwise, we should use the |
| 609 | // |node|'s current BrowsingContextState. |
| 610 | node->render_manager()->CreateRenderFrameProxy( |
Sharon Yang | dcc5f25 | 2024-05-09 18:27:23 | [diff] [blame] | 611 | site_instance_group, |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 612 | node == source ? source_new_browsing_context_state |
| 613 | : node->current_frame_host()->browsing_context_state(), |
Alex Moshchuk | d0d759c2 | 2025-05-09 18:18:35 | [diff] [blame] | 614 | navigation_metrics_token, batched_proxy_ipc_sender.get()); |
Alex Moshchuk | 27caae8 | 2017-09-11 23:11:18 | [diff] [blame] | 615 | } |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 616 | } |
Peilin Wang | 427aa6a | 2023-03-22 17:58:33 | [diff] [blame] | 617 | |
| 618 | if (batched_proxy_ipc_sender) { |
| 619 | batched_proxy_ipc_sender->CreateAllProxies(); |
| 620 | } |
[email protected] | 82307f6b | 2014-08-07 03:30:12 | [diff] [blame] | 621 | } |
| 622 | |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 623 | RenderFrameHostImpl* FrameTree::GetMainFrame() const { |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 624 | return root_.current_frame_host(); |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 625 | } |
| 626 | |
[email protected] | 9c9343b | 2014-03-08 02:56:07 | [diff] [blame] | 627 | FrameTreeNode* FrameTree::GetFocusedFrame() { |
| 628 | return FindByID(focused_frame_tree_node_id_); |
| 629 | } |
| 630 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 631 | void FrameTree::SetFocusedFrame(FrameTreeNode* node, |
| 632 | SiteInstanceGroup* source) { |
Rakina Zata Amni | cca4889e | 2021-09-28 23:25:55 | [diff] [blame] | 633 | CHECK(node->current_frame_host()->IsActive()); |
alexmos | 5357efb | 2015-12-16 21:44:00 | [diff] [blame] | 634 | if (node == GetFocusedFrame()) |
| 635 | return; |
| 636 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 637 | std::set<SiteInstanceGroup*> frame_tree_groups = |
| 638 | CollectSiteInstanceGroups(this); |
alexmos | b1dc216 | 2015-11-05 00:59:20 | [diff] [blame] | 639 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 640 | SiteInstanceGroup* current_group = |
| 641 | node->current_frame_host()->GetSiteInstance()->group(); |
alexmos | 5357efb | 2015-12-16 21:44:00 | [diff] [blame] | 642 | |
Sharon Yang | 7424bda | 2021-11-04 20:27:43 | [diff] [blame] | 643 | // Update the focused frame in all other SiteInstanceGroups. If focus changes |
| 644 | // to a cross-group frame, this allows the old focused frame's renderer |
alexmos | b1dc216 | 2015-11-05 00:59:20 | [diff] [blame] | 645 | // process to clear focus from that frame and fire blur events. It also |
| 646 | // ensures that the latest focused frame is available in all renderers to |
| 647 | // compute document.activeElement. |
alexmos | 5357efb | 2015-12-16 21:44:00 | [diff] [blame] | 648 | // |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 649 | // We do not notify the |source| SiteInstanceGroup because it already knows |
| 650 | // the new focused frame (since it initiated the focus change), and we notify |
| 651 | // the new focused frame's SiteInstanceGroup (if it differs from |source|) |
| 652 | // separately below. |
| 653 | for (auto* group : frame_tree_groups) { |
| 654 | if (group != source && group != current_group) { |
| 655 | RenderFrameProxyHost* proxy = node->current_frame_host() |
| 656 | ->browsing_context_state() |
| 657 | ->GetRenderFrameProxyHost(group); |
Sharon Yang | f92842a | 2022-03-01 18:21:47 | [diff] [blame] | 658 | |
Rakina Zata Amni | 8070040 | 2021-09-20 17:18:03 | [diff] [blame] | 659 | if (proxy) { |
| 660 | proxy->SetFocusedFrame(); |
| 661 | } else { |
Sharon Yang | f92842a | 2022-03-01 18:21:47 | [diff] [blame] | 662 | base::debug::DumpWithoutCrashing(); |
Rakina Zata Amni | 8070040 | 2021-09-20 17:18:03 | [diff] [blame] | 663 | } |
alexmos | b1dc216 | 2015-11-05 00:59:20 | [diff] [blame] | 664 | } |
alexmos | ca2c6ba | 2015-10-01 21:52:25 | [diff] [blame] | 665 | } |
| 666 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 667 | // If |node| was focused from a cross-group frame (i.e., via |
alexmos | 5357efb | 2015-12-16 21:44:00 | [diff] [blame] | 668 | // window.focus()), tell its RenderFrame that it should focus. |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 669 | if (current_group != source) |
alexmos | 5357efb | 2015-12-16 21:44:00 | [diff] [blame] | 670 | node->current_frame_host()->SetFocusedFrame(); |
| 671 | |
[email protected] | 9c9343b | 2014-03-08 02:56:07 | [diff] [blame] | 672 | focused_frame_tree_node_id_ = node->frame_tree_node_id(); |
alexmos | 21acae5 | 2015-11-07 01:04:43 | [diff] [blame] | 673 | node->DidFocus(); |
dmazzoni | f27bf89 | 2016-03-10 15:51:55 | [diff] [blame] | 674 | |
| 675 | // The accessibility tree data for the root of the frame tree keeps |
| 676 | // track of the focused frame too, so update that every time the |
| 677 | // focused frame changes. |
Kevin McNee | 582a7d6 | 2021-10-12 21:42:22 | [diff] [blame] | 678 | root() |
| 679 | ->current_frame_host() |
| 680 | ->GetOutermostMainFrameOrEmbedder() |
| 681 | ->UpdateAXTreeData(); |
[email protected] | 9c9343b | 2014-03-08 02:56:07 | [diff] [blame] | 682 | } |
| 683 | |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 684 | scoped_refptr<RenderViewHostImpl> FrameTree::CreateRenderViewHost( |
Sharon Yang | eb76ee2 | 2023-11-29 00:42:09 | [diff] [blame] | 685 | SiteInstanceGroup* site_instance_group, |
avi | b734894 | 2015-12-25 20:57:10 | [diff] [blame] | 686 | int32_t main_frame_routing_id, |
Harkiran Bolaria | 57e2b06 | 2022-03-14 10:27:58 | [diff] [blame] | 687 | bool renderer_initiated_creation, |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 688 | scoped_refptr<BrowsingContextState> main_browsing_context_state, |
Khushal Sagar | 402d1c9f | 2023-11-15 22:21:48 | [diff] [blame] | 689 | CreateRenderViewHostCase create_case, |
Arthur Sonzogni | c686e8f | 2024-01-11 08:36:37 | [diff] [blame] | 690 | std::optional<viz::FrameSinkId> frame_sink_id) { |
Harkiran Bolaria | 57e2b06 | 2022-03-14 10:27:58 | [diff] [blame] | 691 | if (main_browsing_context_state) { |
| 692 | DCHECK(main_browsing_context_state->is_main_frame()); |
| 693 | } |
dcheng | 29f5a6c | 2015-08-31 21:43:27 | [diff] [blame] | 694 | RenderViewHostImpl* rvh = |
| 695 | static_cast<RenderViewHostImpl*>(RenderViewHostFactory::Create( |
Sharon Yang | eb76ee2 | 2023-11-29 00:42:09 | [diff] [blame] | 696 | this, site_instance_group, |
| 697 | site_instance_group->GetStoragePartitionConfig(), |
| 698 | render_view_delegate_, render_widget_delegate_, main_frame_routing_id, |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 699 | renderer_initiated_creation, std::move(main_browsing_context_state), |
Khushal Sagar | 402d1c9f | 2023-11-15 22:21:48 | [diff] [blame] | 700 | create_case, frame_sink_id)); |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 701 | |
Rakina Zata Amni | df9988fa1 | 2024-07-30 02:00:50 | [diff] [blame] | 702 | if (create_case == CreateRenderViewHostCase::kSpeculative) { |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 703 | set_speculative_render_view_host(rvh->GetWeakPtr()); |
| 704 | } else { |
| 705 | // Register non-speculative RenderViewHosts. If they are speculative, they |
| 706 | // will be registered when they become active. |
| 707 | RegisterRenderViewHost(rvh->rvh_map_id(), rvh); |
| 708 | } |
| 709 | |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 710 | return base::WrapRefCounted(rvh); |
[email protected] | 94d0cc1 | 2013-12-18 00:07:41 | [diff] [blame] | 711 | } |
| 712 | |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 713 | scoped_refptr<RenderViewHostImpl> FrameTree::GetRenderViewHost( |
Sharon Yang | 57bde12 | 2022-03-01 20:01:12 | [diff] [blame] | 714 | SiteInstanceGroup* group) { |
Sharon Yang | a2fe85e | 2022-02-09 21:38:29 | [diff] [blame] | 715 | // When called from RenderFrameHostManager::CreateRenderFrameHost, it's |
| 716 | // possible that a RenderProcessHost hasn't yet been created, which means |
Sharon Yang | 57bde12 | 2022-03-01 20:01:12 | [diff] [blame] | 717 | // a SiteInstanceGroup won't have been created yet. |
Sharon Yang | a2fe85e | 2022-02-09 21:38:29 | [diff] [blame] | 718 | if (!group) |
| 719 | return nullptr; |
| 720 | |
| 721 | auto it = render_view_host_map_.find(GetRenderViewHostMapId(group)); |
arthursonzogni | 88e54ae | 2019-04-15 12:57:36 | [diff] [blame] | 722 | if (it == render_view_host_map_.end()) |
| 723 | return nullptr; |
alexmos | 9aa6123 | 2016-04-26 21:54:02 | [diff] [blame] | 724 | |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 725 | return base::WrapRefCounted(it->second); |
[email protected] | 94d0cc1 | 2013-12-18 00:07:41 | [diff] [blame] | 726 | } |
| 727 | |
Aaron Colwell | 78b4bde | 2021-03-16 16:16:09 | [diff] [blame] | 728 | FrameTree::RenderViewHostMapId FrameTree::GetRenderViewHostMapId( |
Sharon Yang | c581a0c | 2021-11-02 18:09:39 | [diff] [blame] | 729 | SiteInstanceGroup* site_instance_group) const { |
| 730 | return RenderViewHostMapId::FromUnsafeValue( |
| 731 | site_instance_group->GetId().value()); |
Lowell Manners | 75055a13 | 2019-10-11 10:30:29 | [diff] [blame] | 732 | } |
| 733 | |
Aaron Colwell | 78b4bde | 2021-03-16 16:16:09 | [diff] [blame] | 734 | void FrameTree::RegisterRenderViewHost(RenderViewHostMapId id, |
| 735 | RenderViewHostImpl* rvh) { |
Rakina Zata Amni | 4b1968d | 2021-09-09 03:29:47 | [diff] [blame] | 736 | TRACE_EVENT_INSTANT("navigation", "FrameTree::RegisterRenderViewHost", |
| 737 | ChromeTrackEvent::kRenderViewHost, *rvh); |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 738 | CHECK(!rvh->is_speculative()); |
Rakina Zata Amni | 89b8aa3 | 2024-09-20 03:36:54 | [diff] [blame] | 739 | bool rvh_id_already_in_map = base::Contains(render_view_host_map_, id); |
| 740 | bool rfh_in_bfcache = |
| 741 | controller() |
| 742 | .GetBackForwardCache() |
| 743 | .IsRenderFrameHostWithSIGInBackForwardCacheForDebugging( |
| 744 | rvh->site_instance_group()->GetId()); |
| 745 | bool rfph_in_bfcache = |
| 746 | controller() |
| 747 | .GetBackForwardCache() |
| 748 | .IsRenderFrameProxyHostWithSIGInBackForwardCacheForDebugging( |
| 749 | rvh->site_instance_group()->GetId()); |
| 750 | bool rvh_in_bfcache = |
| 751 | controller() |
| 752 | .GetBackForwardCache() |
| 753 | .IsRenderViewHostWithMapIdInBackForwardCacheForDebugging(*rvh); |
| 754 | // We're seeing cases where an RVH being restored from BFCache has the same |
| 755 | // ID as an RVH already in the map, where the 2 RVHs are different but one |
| 756 | // was in BFCache and one isn't. |
| 757 | // To investigate, detect if any of these cases happen: |
| 758 | // 1) A RenderViewHost with the same ID as `rvh` is already in the map |
| 759 | // 2) A RenderFrameHost with the same SIG ID as `rvh` is in BFCache |
| 760 | // 3) A RenderFrameProxyHost with the same SIG ID as `rvh` is in BFCache |
| 761 | // 4) A RenderViewHost with the same ID as `rvh` is in BFCache |
| 762 | // These cases shouldn't be possible. Note that when checking #2-#4 for |
| 763 | // a RenderViewHost that is getting out of BFCache, we are guaranteed to not |
| 764 | // accidentally match to the RVH/RFPH/RFH of the page being restored, |
| 765 | // because we can only get here after the StoredPage is taken out of the |
| 766 | // BFCache and thus won't be iterated over in the functions above. |
| 767 | // See the linked bug below for more details. |
| 768 | if (rvh_id_already_in_map || rfh_in_bfcache || rfph_in_bfcache || |
| 769 | rvh_in_bfcache) { |
Rakina Zata Amni | 9b7ea705 | 2024-09-04 20:40:58 | [diff] [blame] | 770 | // TODO(https://crbug.com/354382462): Remove crash keys once investigation |
| 771 | // is done. |
Rakina Zata Amni | 89b8aa3 | 2024-09-20 03:36:54 | [diff] [blame] | 772 | SCOPED_CRASH_KEY_BOOL("rvh-double", "in_map", rvh_id_already_in_map); |
| 773 | SCOPED_CRASH_KEY_BOOL("rvh-double", "rfh_in_bfcache", rfh_in_bfcache); |
| 774 | SCOPED_CRASH_KEY_BOOL("rvh-double", "rfph_in_bfcache", rfph_in_bfcache); |
| 775 | SCOPED_CRASH_KEY_BOOL("rvh-double", "rvh_in_bfcache", rvh_in_bfcache); |
| 776 | SCOPED_CRASH_KEY_BOOL("rvh-double", "passed_renderer_created", |
Rakina Zata Amni | d300603 | 2024-09-12 00:53:53 | [diff] [blame] | 777 | rvh->renderer_view_created()); |
Rakina Zata Amni | d300603 | 2024-09-12 00:53:53 | [diff] [blame] | 778 | SCOPED_CRASH_KEY_NUMBER("rvh-double", "passed_rvh_main_id", |
| 779 | rvh->main_frame_routing_id()); |
| 780 | SCOPED_CRASH_KEY_NUMBER("rvh-double", "root_routing_id", |
| 781 | root()->current_frame_host()->GetRoutingID()); |
Rakina Zata Amni | d300603 | 2024-09-12 00:53:53 | [diff] [blame] | 782 | SCOPED_CRASH_KEY_NUMBER("rvh-double", "passed_rvh_ptr", |
| 783 | reinterpret_cast<size_t>(rvh)); |
Rakina Zata Amni | 89b8aa3 | 2024-09-20 03:36:54 | [diff] [blame] | 784 | SCOPED_CRASH_KEY_BOOL("rvh-double", "passed_rvh_bfcache", |
| 785 | rvh->is_in_back_forward_cache()); |
| 786 | SCOPED_CRASH_KEY_BOOL("rvh-double", "frame_tree_primary", is_primary()); |
| 787 | |
| 788 | if (rvh_id_already_in_map) { |
| 789 | SCOPED_CRASH_KEY_BOOL( |
| 790 | "rvh-double", "mapped_rvh_registered", |
| 791 | render_view_host_map_[id]->is_registered_with_frame_tree()); |
| 792 | SCOPED_CRASH_KEY_NUMBER( |
| 793 | "rvh-double", "mapped_rvh_main_id", |
| 794 | render_view_host_map_[id]->main_frame_routing_id()); |
| 795 | SCOPED_CRASH_KEY_NUMBER( |
| 796 | "rvh-double", "map_rvh_ptr", |
| 797 | reinterpret_cast<size_t>(render_view_host_map_[id])); |
| 798 | SCOPED_CRASH_KEY_BOOL( |
| 799 | "rvh-double", "map_rvh_bfcache", |
| 800 | render_view_host_map_[id]->is_in_back_forward_cache()); |
| 801 | SCOPED_CRASH_KEY_BOOL("rvh-double", "mapped_renderer_created", |
| 802 | render_view_host_map_[id]->renderer_view_created()); |
| 803 | CHECK_EQ(rvh, render_view_host_map_[id]); |
| 804 | } |
Rakina Zata Amni | 9b7ea705 | 2024-09-04 20:40:58 | [diff] [blame] | 805 | } |
Aaron Colwell | 78b4bde | 2021-03-16 16:16:09 | [diff] [blame] | 806 | render_view_host_map_[id] = rvh; |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 807 | rvh->set_is_registered_with_frame_tree(true); |
Aaron Colwell | 78b4bde | 2021-03-16 16:16:09 | [diff] [blame] | 808 | } |
| 809 | |
| 810 | void FrameTree::UnregisterRenderViewHost(RenderViewHostMapId id, |
Aaron Colwell | c4bd7d6 | 2021-01-29 04:23:13 | [diff] [blame] | 811 | RenderViewHostImpl* rvh) { |
Rakina Zata Amni | 4b1968d | 2021-09-09 03:29:47 | [diff] [blame] | 812 | TRACE_EVENT_INSTANT("navigation", "FrameTree::UnregisterRenderViewHost", |
| 813 | ChromeTrackEvent::kRenderViewHost, *rvh); |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 814 | CHECK(!rvh->is_speculative()); |
Aaron Colwell | 78b4bde | 2021-03-16 16:16:09 | [diff] [blame] | 815 | auto it = render_view_host_map_.find(id); |
arthursonzogni | 88e54ae | 2019-04-15 12:57:36 | [diff] [blame] | 816 | CHECK(it != render_view_host_map_.end()); |
arthursonzogni | c5be384 | 2019-07-09 11:49:14 | [diff] [blame] | 817 | CHECK_EQ(it->second, rvh); |
| 818 | render_view_host_map_.erase(it); |
Sharon Yang | 7ce309e | 2023-01-19 21:39:57 | [diff] [blame] | 819 | rvh->set_is_registered_with_frame_tree(false); |
[email protected] | 94d0cc1 | 2013-12-18 00:07:41 | [diff] [blame] | 820 | } |
| 821 | |
arthursonzogni | 0a200779 | 2019-05-28 21:32:48 | [diff] [blame] | 822 | void FrameTree::FrameUnloading(FrameTreeNode* frame) { |
| 823 | if (frame->frame_tree_node_id() == focused_frame_tree_node_id_) |
Avi Drissman | bd15364 | 2024-09-03 18:58:05 | [diff] [blame] | 824 | focused_frame_tree_node_id_ = FrameTreeNodeId(); |
arthursonzogni | 0a200779 | 2019-05-28 21:32:48 | [diff] [blame] | 825 | |
| 826 | // Ensure frames that are about to be deleted aren't visible from the other |
| 827 | // processes anymore. |
Harkiran Bolaria | 0b3bdef0 | 2022-03-10 13:04:40 | [diff] [blame] | 828 | frame->GetBrowsingContextStateForSubframe()->ResetProxyHosts(); |
arthursonzogni | 0a200779 | 2019-05-28 21:32:48 | [diff] [blame] | 829 | } |
| 830 | |
dmazzoni | e950ea23 | 2015-03-13 21:39:45 | [diff] [blame] | 831 | void FrameTree::FrameRemoved(FrameTreeNode* frame) { |
nick | 53d5cbf | 2015-04-23 22:50:14 | [diff] [blame] | 832 | if (frame->frame_tree_node_id() == focused_frame_tree_node_id_) |
Avi Drissman | bd15364 | 2024-09-03 18:58:05 | [diff] [blame] | 833 | focused_frame_tree_node_id_ = FrameTreeNodeId(); |
dmazzoni | e950ea23 | 2015-03-13 21:39:45 | [diff] [blame] | 834 | } |
| 835 | |
Sreeja Kamishetty | 0be3b1b | 2021-08-12 17:04:15 | [diff] [blame] | 836 | double FrameTree::GetLoadProgress() { |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 837 | if (root_.HasNavigation()) |
Sreeja Kamishetty | 0be3b1b | 2021-08-12 17:04:15 | [diff] [blame] | 838 | return blink::kInitialLoadProgress; |
| 839 | |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 840 | return root_.current_frame_host()->GetPage().load_progress(); |
fdegans | 1d1635516 | 2015-03-26 11:58:34 | [diff] [blame] | 841 | } |
| 842 | |
Yu Gao | c8c1855 | 2022-06-22 14:38:45 | [diff] [blame] | 843 | bool FrameTree::IsLoadingIncludingInnerFrameTrees() const { |
Nate Chapin | 470dbc6 | 2023-04-25 16:34:38 | [diff] [blame] | 844 | return GetLoadingState() != LoadingState::NONE; |
| 845 | } |
| 846 | |
| 847 | LoadingState FrameTree::GetLoadingState() const { |
| 848 | // The overall loading state for the FrameTree matches the root node's loading |
| 849 | // state if the root is loading. |
| 850 | if (root_.GetLoadingState() != LoadingState::NONE) { |
| 851 | return root_.GetLoadingState(); |
dcheng | 57e39e2 | 2016-01-21 00:25:38 | [diff] [blame] | 852 | } |
Nate Chapin | 470dbc6 | 2023-04-25 16:34:38 | [diff] [blame] | 853 | |
| 854 | // Otherwise, check if a subframe is loading without an associated navigation |
| 855 | // in the root frame. If so, we are loading, but we don't want to show |
| 856 | // loading UI. |
| 857 | for (const FrameTreeNode* node_to_check : |
| 858 | const_cast<FrameTree*>(this)->CollectNodesForIsLoading()) { |
| 859 | if (node_to_check->IsLoading()) { |
| 860 | return LoadingState::LOADING_WITHOUT_UI; |
| 861 | } |
| 862 | } |
| 863 | return LoadingState::NONE; |
fdegans | 1d1635516 | 2015-03-26 11:58:34 | [diff] [blame] | 864 | } |
| 865 | |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 866 | void FrameTree::ReplicatePageFocus(bool is_focused) { |
Dave Tapuska | 53e6ce1 | 2021-08-06 16:08:24 | [diff] [blame] | 867 | // Focus loss may occur while this FrameTree is being destroyed. Don't |
| 868 | // send the message in this case, as the main frame's RenderFrameHost and |
| 869 | // other state has already been cleared. |
| 870 | if (is_being_destroyed_) |
| 871 | return; |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 872 | std::set<SiteInstanceGroup*> frame_tree_site_instance_groups = |
| 873 | CollectSiteInstanceGroups(this); |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 874 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 875 | // Send the focus update to main frame's proxies in all SiteInstanceGroups of |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 876 | // other frames in this FrameTree. Note that the main frame might also know |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 877 | // about proxies in SiteInstanceGroups for frames in a different FrameTree |
| 878 | // (e.g., for window.open), so we can't just iterate over its proxy_hosts_ in |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 879 | // RenderFrameHostManager. |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 880 | for (auto* group : frame_tree_site_instance_groups) |
| 881 | SetPageFocus(group, is_focused); |
alexmos | 0d7e0b09b | 2015-10-29 22:11:48 | [diff] [blame] | 882 | } |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 883 | |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 884 | void FrameTree::SetPageFocus(SiteInstanceGroup* group, bool is_focused) { |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 885 | RenderFrameHostManager* root_manager = root_.render_manager(); |
alexmos | 0d7e0b09b | 2015-10-29 22:11:48 | [diff] [blame] | 886 | |
| 887 | // This is only used to set page-level focus in cross-process subframes, and |
Sharon Yang | efe5263 | 2022-03-08 23:06:06 | [diff] [blame] | 888 | // requests to set focus in main frame's SiteInstanceGroup are ignored. |
| 889 | if (group != root_manager->current_frame_host()->GetSiteInstance()->group()) { |
| 890 | RenderFrameProxyHost* proxy = root_manager->current_frame_host() |
| 891 | ->browsing_context_state() |
| 892 | ->GetRenderFrameProxyHost(group); |
Dave Tapuska | 82b5401 | 2022-07-15 23:26:10 | [diff] [blame] | 893 | if (proxy->is_render_frame_proxy_live()) |
| 894 | proxy->GetAssociatedRemoteFrame()->SetPageFocus(is_focused); |
alexmos | 3fcd0ca | 2015-10-23 18:18:33 | [diff] [blame] | 895 | } |
| 896 | } |
| 897 | |
W. James MacLean | c07dc41b | 2022-07-25 18:52:16 | [diff] [blame] | 898 | void FrameTree::RegisterExistingOriginAsHavingDefaultIsolation( |
W. James MacLean | b70fab8 | 2020-05-01 18:51:14 | [diff] [blame] | 899 | const url::Origin& previously_visited_origin, |
| 900 | NavigationRequest* navigation_request_to_exclude) { |
W. James MacLean | c07dc41b | 2022-07-25 18:52:16 | [diff] [blame] | 901 | controller().RegisterExistingOriginAsHavingDefaultIsolation( |
W. James MacLean | c6dc86c | 2021-08-12 13:58:37 | [diff] [blame] | 902 | previously_visited_origin); |
| 903 | |
Charlie Reis | 37be268 | 2023-01-10 17:04:47 | [diff] [blame] | 904 | std::unordered_set<SiteInstanceImpl*> matching_site_instances; |
W. James MacLean | b70fab8 | 2020-05-01 18:51:14 | [diff] [blame] | 905 | |
| 906 | // Be sure to visit all RenderFrameHosts associated with this frame that might |
| 907 | // have an origin that could script other frames. We skip RenderFrameHosts |
| 908 | // that are in the bfcache, assuming there's no way for a frame to join the |
| 909 | // BrowsingInstance of a bfcache RFH while it's in the cache. |
| 910 | for (auto* frame_tree_node : SubtreeNodes(root())) { |
| 911 | auto* frame_host = frame_tree_node->current_frame_host(); |
W. James MacLean | b70fab8 | 2020-05-01 18:51:14 | [diff] [blame] | 912 | if (previously_visited_origin == frame_host->GetLastCommittedOrigin()) |
| 913 | matching_site_instances.insert(frame_host->GetSiteInstance()); |
| 914 | |
| 915 | if (frame_host->HasCommittingNavigationRequestForOrigin( |
| 916 | previously_visited_origin, navigation_request_to_exclude)) { |
| 917 | matching_site_instances.insert(frame_host->GetSiteInstance()); |
| 918 | } |
| 919 | |
| 920 | auto* spec_frame_host = |
| 921 | frame_tree_node->render_manager()->speculative_frame_host(); |
| 922 | if (spec_frame_host && |
| 923 | spec_frame_host->HasCommittingNavigationRequestForOrigin( |
| 924 | previously_visited_origin, navigation_request_to_exclude)) { |
| 925 | matching_site_instances.insert(spec_frame_host->GetSiteInstance()); |
| 926 | } |
| 927 | |
| 928 | auto* navigation_request = frame_tree_node->navigation_request(); |
| 929 | if (navigation_request && |
| 930 | navigation_request != navigation_request_to_exclude && |
| 931 | navigation_request->HasCommittingOrigin(previously_visited_origin)) { |
| 932 | matching_site_instances.insert(frame_host->GetSiteInstance()); |
| 933 | } |
| 934 | } |
| 935 | |
| 936 | // Update any SiteInstances found to contain |origin|. |
| 937 | for (auto* site_instance : matching_site_instances) { |
Charlie Reis | 37be268 | 2023-01-10 17:04:47 | [diff] [blame] | 938 | site_instance->RegisterAsDefaultOriginIsolation(previously_visited_origin); |
W. James MacLean | b70fab8 | 2020-05-01 18:51:14 | [diff] [blame] | 939 | } |
| 940 | } |
| 941 | |
Charlie Reis | 37be268 | 2023-01-10 17:04:47 | [diff] [blame] | 942 | void FrameTree::Init(SiteInstanceImpl* main_frame_site_instance, |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 943 | bool renderer_initiated_creation, |
Rakina Zata Amni | afd3c658 | 2021-11-30 06:19:17 | [diff] [blame] | 944 | const std::string& main_frame_name, |
Rakina Zata Amni | 4eb716e | 2022-04-05 21:32:46 | [diff] [blame] | 945 | RenderFrameHostImpl* opener_for_origin, |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 946 | const blink::FramePolicy& frame_policy, |
| 947 | const base::UnguessableToken& devtools_frame_token) { |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 948 | // blink::FrameTree::SetName always keeps |unique_name| empty in case of a |
| 949 | // main frame - let's do the same thing here. |
| 950 | std::string unique_name; |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 951 | root_.render_manager()->InitRoot(main_frame_site_instance, |
| 952 | renderer_initiated_creation, frame_policy, |
Danil Somsikov | 259aa65f | 2022-11-11 20:49:44 | [diff] [blame] | 953 | main_frame_name, devtools_frame_token); |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 954 | root_.SetFencedFramePropertiesIfNeeded(); |
Rakina Zata Amni | afd3c658 | 2021-11-30 06:19:17 | [diff] [blame] | 955 | |
sbingler | 1f75884 | 2023-02-22 00:23:32 | [diff] [blame] | 956 | // The initial empty document should inherit the origin (the origin may |
| 957 | // change after the first commit) and other state (such as the |
| 958 | // RuntimeFeatureStateReadContext) from its opener, except when they are in |
Rakina Zata Amni | 4eb716e | 2022-04-05 21:32:46 | [diff] [blame] | 959 | // different browsing context groups (`renderer_initiated_creation` will be |
sbingler | 1f75884 | 2023-02-22 00:23:32 | [diff] [blame] | 960 | // false), where it should use a new opaque origin and default values for the |
| 961 | // other state, respectively. |
Rakina Zata Amni | afd3c658 | 2021-11-30 06:19:17 | [diff] [blame] | 962 | // See also https://crbug.com/932067. |
| 963 | // |
| 964 | // Note that the origin of the new frame might depend on sandbox flags. |
| 965 | // Checking sandbox flags of the new frame should be safe at this point, |
| 966 | // because the flags should be already inherited when creating the root node. |
Rakina Zata Amni | 4eb716e | 2022-04-05 21:32:46 | [diff] [blame] | 967 | DCHECK(!renderer_initiated_creation || opener_for_origin); |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 968 | root_.current_frame_host()->SetOriginDependentStateOfNewFrame( |
sbingler | 1f75884 | 2023-02-22 00:23:32 | [diff] [blame] | 969 | renderer_initiated_creation ? opener_for_origin : nullptr); |
Rakina Zata Amni | 2322f4f8 | 2022-01-24 13:24:24 | [diff] [blame] | 970 | |
Rakina Zata Amni | 46087a1 | 2022-11-11 08:28:38 | [diff] [blame] | 971 | controller().CreateInitialEntry(); |
Carlos Caballero | 40b0efd | 2021-01-26 11:55:00 | [diff] [blame] | 972 | } |
| 973 | |
Carlos Caballero | ede6f8c | 2021-01-28 11:01:50 | [diff] [blame] | 974 | void FrameTree::DidAccessInitialMainDocument() { |
| 975 | OPTIONAL_TRACE_EVENT0("content", "FrameTree::DidAccessInitialDocument"); |
| 976 | has_accessed_initial_main_document_ = true; |
| 977 | controller().DidAccessInitialMainDocument(); |
| 978 | } |
| 979 | |
Nate Chapin | 470dbc6 | 2023-04-25 16:34:38 | [diff] [blame] | 980 | void FrameTree::NodeLoadingStateChanged( |
| 981 | FrameTreeNode& node, |
| 982 | LoadingState previous_frame_tree_loading_state) { |
| 983 | LoadingState new_frame_tree_loading_state = GetLoadingState(); |
| 984 | if (previous_frame_tree_loading_state == new_frame_tree_loading_state) { |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 985 | return; |
Nate Chapin | 470dbc6 | 2023-04-25 16:34:38 | [diff] [blame] | 986 | } |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 987 | |
Nate Chapin | 470dbc6 | 2023-04-25 16:34:38 | [diff] [blame] | 988 | root()->render_manager()->SetIsLoading(new_frame_tree_loading_state != |
| 989 | LoadingState::NONE); |
| 990 | delegate_->LoadingStateChanged(new_frame_tree_loading_state); |
| 991 | if (previous_frame_tree_loading_state == LoadingState::NONE) { |
| 992 | delegate_->DidStartLoading(&node); |
| 993 | } else if (new_frame_tree_loading_state == LoadingState::NONE) { |
| 994 | delegate_->DidStopLoading(); |
| 995 | } |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 996 | } |
| 997 | |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 998 | void FrameTree::DidCancelLoading() { |
| 999 | OPTIONAL_TRACE_EVENT0("content", "FrameTree::DidCancelLoading"); |
| 1000 | navigator_.controller().DiscardNonCommittedEntries(); |
Carlos Caballero | 0326252 | 2021-02-05 14:49:58 | [diff] [blame] | 1001 | } |
| 1002 | |
| 1003 | void FrameTree::StopLoading() { |
| 1004 | for (FrameTreeNode* node : Nodes()) |
| 1005 | node->StopLoading(); |
| 1006 | } |
| 1007 | |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1008 | void FrameTree::Shutdown() { |
Dave Tapuska | e88286de | 2021-08-05 19:10:42 | [diff] [blame] | 1009 | is_being_destroyed_ = true; |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1010 | #if DCHECK_IS_ON() |
| 1011 | DCHECK(!was_shut_down_); |
| 1012 | was_shut_down_ = true; |
| 1013 | #endif |
| 1014 | |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 1015 | RenderFrameHostManager* root_manager = root_.render_manager(); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1016 | |
Carlos Caballero | db7a8f6e | 2021-04-09 18:17:47 | [diff] [blame] | 1017 | if (!root_manager->current_frame_host()) { |
| 1018 | // The page has been transferred out during an activation. There is little |
| 1019 | // left to do. |
Alison Gale | 770f3fc | 2024-04-27 00:39:58 | [diff] [blame] | 1020 | // TODO(crbug.com/40177949): If we decide that pending delete RFHs |
Carlos Caballero | db7a8f6e | 2021-04-09 18:17:47 | [diff] [blame] | 1021 | // need to be moved along during activation replace this line with a DCHECK |
| 1022 | // that there are no pending delete instances. |
| 1023 | root_manager->ClearRFHsPendingShutdown(); |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 1024 | DCHECK(!root_.navigation_request()); |
Carlos Caballero | db7a8f6e | 2021-04-09 18:17:47 | [diff] [blame] | 1025 | DCHECK(!root_manager->speculative_frame_host()); |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 1026 | manager_delegate_->OnFrameTreeNodeDestroyed(&root_); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1027 | return; |
Carlos Caballero | db7a8f6e | 2021-04-09 18:17:47 | [diff] [blame] | 1028 | } |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1029 | |
| 1030 | for (FrameTreeNode* node : Nodes()) { |
| 1031 | // Delete all RFHs pending shutdown, which will lead the corresponding RVHs |
| 1032 | // to be shutdown and be deleted as well. |
| 1033 | node->render_manager()->ClearRFHsPendingShutdown(); |
Alison Gale | 47d1537d | 2024-04-19 21:31:46 | [diff] [blame] | 1034 | // TODO(crbug.com/40177939): Ban WebUI instance in Prerender pages. |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1035 | node->render_manager()->ClearWebUIInstances(); |
| 1036 | } |
| 1037 | |
| 1038 | // Destroy all subframes now. This notifies observers. |
| 1039 | root_manager->current_frame_host()->ResetChildren(); |
Harkiran Bolaria | 0b3bdef0 | 2022-03-10 13:04:40 | [diff] [blame] | 1040 | root_manager->current_frame_host() |
| 1041 | ->browsing_context_state() |
| 1042 | ->ResetProxyHosts(); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1043 | |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1044 | // Manually call the observer methods for the root FrameTreeNode. It is |
| 1045 | // necessary to manually delete all objects tracking navigations |
| 1046 | // (NavigationHandle, NavigationRequest) for observers to be properly |
| 1047 | // notified of these navigations stopping before the WebContents is |
| 1048 | // destroyed. |
| 1049 | |
| 1050 | root_manager->current_frame_host()->RenderFrameDeleted(); |
Rakina Zata Amni | f8f2bb6 | 2022-11-23 05:54:32 | [diff] [blame] | 1051 | root_manager->current_frame_host()->ResetOwnedNavigationRequests( |
| 1052 | NavigationDiscardReason::kWillRemoveFrame); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1053 | |
| 1054 | // Do not update state as the FrameTree::Delegate (possibly a WebContents) is |
| 1055 | // being destroyed. |
Rakina Zata Amni | 58681c6 | 2024-06-25 06:32:13 | [diff] [blame] | 1056 | root_.ResetNavigationRequestButKeepState( |
| 1057 | NavigationDiscardReason::kWillRemoveFrame); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1058 | if (root_manager->speculative_frame_host()) { |
Daniel Cheng | c3d1e8d | 2021-06-23 02:11:45 | [diff] [blame] | 1059 | root_manager->DiscardSpeculativeRenderFrameHostForShutdown(); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1060 | } |
| 1061 | |
Alexander Timin | 8aeee64 | 2021-05-12 08:39:33 | [diff] [blame] | 1062 | // NavigationRequests restoring the page from bfcache have a reference to the |
| 1063 | // RFHs stored in the cache, so the cache should be cleared after the |
| 1064 | // navigation request is reset. |
| 1065 | controller().GetBackForwardCache().Shutdown(); |
| 1066 | |
Paul Semel | 3e24104 | 2022-10-11 12:57:31 | [diff] [blame] | 1067 | manager_delegate_->OnFrameTreeNodeDestroyed(&root_); |
Carlos Caballero | 101ac26b | 2021-03-24 11:54:05 | [diff] [blame] | 1068 | render_view_delegate_->RenderViewDeleted( |
| 1069 | root_manager->current_frame_host()->render_view_host()); |
| 1070 | } |
| 1071 | |
Dave Tapuska | d8b0530f | 2021-10-19 15:12:31 | [diff] [blame] | 1072 | base::SafeRef<FrameTree> FrameTree::GetSafeRef() { |
| 1073 | return weak_ptr_factory_.GetSafeRef(); |
| 1074 | } |
| 1075 | |
Dave Tapuska | 54c76a03 | 2021-10-27 22:10:42 | [diff] [blame] | 1076 | void FrameTree::FocusOuterFrameTrees() { |
| 1077 | OPTIONAL_TRACE_EVENT0("content", "FrameTree::FocusOuterFrameTrees"); |
| 1078 | |
| 1079 | FrameTree* frame_tree_to_focus = this; |
| 1080 | while (true) { |
| 1081 | FrameTreeNode* outer_node = FrameTreeNode::GloballyFindByID( |
| 1082 | frame_tree_to_focus->delegate()->GetOuterDelegateFrameTreeNodeId()); |
| 1083 | if (!outer_node || !outer_node->current_frame_host()->IsActive()) { |
| 1084 | // Don't set focus on an inactive FrameTreeNode. |
| 1085 | return; |
| 1086 | } |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 1087 | outer_node->frame_tree().SetFocusedFrame(outer_node, nullptr); |
Dave Tapuska | 54c76a03 | 2021-10-27 22:10:42 | [diff] [blame] | 1088 | |
| 1089 | // For a browser initiated focus change, let embedding renderer know of the |
| 1090 | // change. Otherwise, if the currently focused element is just across a |
| 1091 | // process boundary in focus order, it will not be possible to move across |
| 1092 | // that boundary. This is because the target element will already be focused |
| 1093 | // (that renderer was not notified) and drop the event. |
| 1094 | if (auto* proxy_to_outer_delegate = frame_tree_to_focus->root() |
| 1095 | ->render_manager() |
| 1096 | ->GetProxyToOuterDelegate()) { |
| 1097 | proxy_to_outer_delegate->SetFocusedFrame(); |
| 1098 | } |
Arthur Sonzogni | f6785ec | 2022-12-05 10:11:50 | [diff] [blame] | 1099 | frame_tree_to_focus = &outer_node->frame_tree(); |
Dave Tapuska | 54c76a03 | 2021-10-27 22:10:42 | [diff] [blame] | 1100 | } |
| 1101 | } |
| 1102 | |
Thomas Lukaszewicz | e4cdf6e | 2025-07-31 23:32:27 | [diff] [blame] | 1103 | void FrameTree::Discard(base::OnceClosure on_discarded_cb) { |
| 1104 | const auto attempt_discard = [this](base::OnceClosure on_discarded_cb) { |
Thomas Lukaszewicz | 0ef0f45f | 2025-02-18 17:59:42 | [diff] [blame] | 1105 | // A speculative pending-commit rfh should not be cancelled or deleted. In |
| 1106 | // this case ignore the discard request and allow the navigation to complete |
| 1107 | // as normal. |
| 1108 | if (const auto* speculative_rfh = |
| 1109 | root()->render_manager()->speculative_frame_host(); |
| 1110 | speculative_rfh && speculative_rfh->HasPendingCommitNavigation()) { |
| 1111 | return false; |
| 1112 | } |
Thomas Lukaszewicz | 1b672fe | 2024-09-17 08:35:03 | [diff] [blame] | 1113 | |
Thomas Lukaszewicz | 0ef0f45f | 2025-02-18 17:59:42 | [diff] [blame] | 1114 | root()->set_was_discarded(); |
Thomas Lukaszewicz | e4cdf6e | 2025-07-31 23:32:27 | [diff] [blame] | 1115 | root()->current_frame_host()->DiscardFrame(std::move(on_discarded_cb)); |
Thomas Lukaszewicz | 0ef0f45f | 2025-02-18 17:59:42 | [diff] [blame] | 1116 | NavigationControllerImpl& navigation_controller = controller(); |
| 1117 | navigation_controller.SetNeedsReload(); |
| 1118 | navigation_controller.GetBackForwardCache().Flush(); |
| 1119 | return true; |
| 1120 | }; |
Thomas Lukaszewicz | e4cdf6e | 2025-07-31 23:32:27 | [diff] [blame] | 1121 | base::UmaHistogramBoolean("Discarding.DiscardFrameTree", |
| 1122 | attempt_discard(std::move(on_discarded_cb))); |
Thomas Lukaszewicz | 8ada31b | 2024-09-01 19:18:16 | [diff] [blame] | 1123 | } |
| 1124 | |
[email protected] | 9b159a5 | 2013-10-03 17:24:55 | [diff] [blame] | 1125 | } // namespace content |