blob: 6b80d081c1853fba4991622e445f97744baa6c27 [file] [log] [blame]
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/renderer_host/frame_tree.h"
#include <stddef.h>
#include <algorithm>
#include <queue>
#include <set>
#include <utility>
#include "base/containers/contains.h"
#include "base/debug/crash_logging.h"
#include "base/debug/dump_without_crashing.h"
#include "base/functional/bind.h"
#include "base/functional/callback.h"
#include "base/lazy_instance.h"
#include "base/memory/ptr_util.h"
#include "base/memory/raw_ptr.h"
#include "base/memory/safe_ref.h"
#include "base/metrics/histogram_functions.h"
#include "base/trace_event/optional_trace_event.h"
#include "base/trace_event/typed_macros.h"
#include "base/types/cxx23_from_range.h"
#include "base/unguessable_token.h"
#include "content/browser/renderer_host/batched_proxy_ipc_sender.h"
#include "content/browser/renderer_host/navigation_controller_impl.h"
#include "content/browser/renderer_host/navigation_entry_impl.h"
#include "content/browser/renderer_host/navigation_request.h"
#include "content/browser/renderer_host/navigator.h"
#include "content/browser/renderer_host/navigator_delegate.h"
#include "content/browser/renderer_host/page_impl.h"
#include "content/browser/renderer_host/render_frame_host_delegate.h"
#include "content/browser/renderer_host/render_frame_host_factory.h"
#include "content/browser/renderer_host/render_frame_host_impl.h"
#include "content/browser/renderer_host/render_frame_proxy_host.h"
#include "content/browser/renderer_host/render_view_host_delegate.h"
#include "content/browser/renderer_host/render_view_host_factory.h"
#include "content/browser/renderer_host/render_view_host_impl.h"
#include "content/common/content_navigation_policy.h"
#include "content/common/content_switches_internal.h"
#include "content/common/features.h"
#include "third_party/blink/public/common/features.h"
#include "third_party/blink/public/common/frame/frame_owner_element_type.h"
#include "third_party/blink/public/common/frame/frame_policy.h"
#include "third_party/blink/public/common/loader/loader_constants.h"
#include "third_party/blink/public/mojom/frame/frame_owner_properties.mojom.h"
namespace content {
namespace {
using perfetto::protos::pbzero::ChromeTrackEvent;
// Helper function to collect SiteInstanceGroups involved in rendering a single
// FrameTree (which is a subset of SiteInstanceGroups in main frame's
// proxy_hosts_ because of openers).
std::set<SiteInstanceGroup*> CollectSiteInstanceGroups(FrameTree* tree) {
std::set<SiteInstanceGroup*> groups;
for (FrameTreeNode* node : tree->Nodes())
groups.insert(node->current_frame_host()->GetSiteInstance()->group());
return groups;
}
// If |node| is the placeholder FrameTreeNode for an embedded frame tree,
// returns the inner tree's main frame's FrameTreeNode. Otherwise, returns null.
FrameTreeNode* GetInnerTreeMainFrameNode(FrameTreeNode* node) {
FrameTreeNode* inner_main_frame_tree_node = FrameTreeNode::GloballyFindByID(
node->current_frame_host()->inner_tree_main_frame_tree_node_id());
if (inner_main_frame_tree_node) {
DCHECK_NE(&node->frame_tree(), &inner_main_frame_tree_node->frame_tree());
}
return inner_main_frame_tree_node;
}
} // namespace
FrameTree::NodeIterator::NodeIterator(const NodeIterator& other) = default;
FrameTree::NodeIterator::~NodeIterator() = default;
FrameTree::NodeIterator& FrameTree::NodeIterator::operator++() {
if (current_node_ != root_of_subtree_to_skip_) {
// Reserve enough space in the queue to accommodate the nodes we're
// going to add, to avoid repeated resize calls.
queue_.reserve(queue_.size() + current_node_->child_count());
for (size_t i = 0; i < current_node_->child_count(); ++i) {
FrameTreeNode* child = current_node_->child_at(i);
FrameTreeNode* inner_tree_main_ftn = GetInnerTreeMainFrameNode(child);
if (should_descend_into_inner_trees_ && inner_tree_main_ftn) {
if (include_delegate_nodes_for_inner_frame_trees_)
queue_.push_back(child);
queue_.push_back(inner_tree_main_ftn);
} else {
queue_.push_back(child);
}
}
if (should_descend_into_inner_trees_) {
auto unattached_nodes =
current_node_->current_frame_host()
->delegate()
->GetUnattachedOwnedNodes(current_node_->current_frame_host());
// Reserve enough space in the queue to accommodate the nodes we're
// going to add.
queue_.reserve(queue_.size() + unattached_nodes.size());
for (auto* unattached_node : unattached_nodes) {
queue_.push_back(unattached_node);
}
}
}
AdvanceNode();
return *this;
}
FrameTree::NodeIterator& FrameTree::NodeIterator::AdvanceSkippingChildren() {
AdvanceNode();
return *this;
}
bool FrameTree::NodeIterator::operator==(const NodeIterator& rhs) const {
return current_node_ == rhs.current_node_;
}
void FrameTree::NodeIterator::AdvanceNode() {
if (!queue_.empty()) {
current_node_ = queue_.front();
queue_.pop_front();
} else {
current_node_ = nullptr;
}
}
FrameTree::NodeIterator::NodeIterator(
const std::vector<raw_ptr<FrameTreeNode, VectorExperimental>>&
starting_nodes,
const FrameTreeNode* root_of_subtree_to_skip,
bool should_descend_into_inner_trees,
bool include_delegate_nodes_for_inner_frame_trees)
: current_node_(nullptr),
root_of_subtree_to_skip_(root_of_subtree_to_skip),
should_descend_into_inner_trees_(should_descend_into_inner_trees),
include_delegate_nodes_for_inner_frame_trees_(
include_delegate_nodes_for_inner_frame_trees),
queue_(base::from_range, starting_nodes) {
// If `include_delegate_nodes_for_inner_frame_trees_` is true then
// `should_descend_into_inner_trees_` must be true.
DCHECK(!include_delegate_nodes_for_inner_frame_trees_ ||
should_descend_into_inner_trees_);
AdvanceNode();
}
FrameTree::NodeIterator FrameTree::NodeRange::begin() {
// We shouldn't be attempting a frame tree traversal while the tree is
// being constructed or destructed.
DCHECK(std::ranges::all_of(starting_nodes_, [](FrameTreeNode* ftn) {
return ftn->current_frame_host();
}));
return NodeIterator(starting_nodes_, root_of_subtree_to_skip_,
should_descend_into_inner_trees_,
include_delegate_nodes_for_inner_frame_trees_);
}
FrameTree::NodeIterator FrameTree::NodeRange::end() {
return NodeIterator({}, nullptr, should_descend_into_inner_trees_,
include_delegate_nodes_for_inner_frame_trees_);
}
FrameTree::NodeRange::NodeRange(
const std::vector<raw_ptr<FrameTreeNode, VectorExperimental>>&
starting_nodes,
const FrameTreeNode* root_of_subtree_to_skip,
bool should_descend_into_inner_trees,
bool include_delegate_nodes_for_inner_frame_trees)
: starting_nodes_(starting_nodes),
root_of_subtree_to_skip_(root_of_subtree_to_skip),
should_descend_into_inner_trees_(should_descend_into_inner_trees),
include_delegate_nodes_for_inner_frame_trees_(
include_delegate_nodes_for_inner_frame_trees) {}
FrameTree::NodeRange::NodeRange(const NodeRange&) = default;
FrameTree::NodeRange::~NodeRange() = default;
FrameTree::FrameTree(
BrowserContext* browser_context,
Delegate* delegate,
NavigationControllerDelegate* navigation_controller_delegate,
NavigatorDelegate* navigator_delegate,
RenderFrameHostDelegate* render_frame_delegate,
RenderViewHostDelegate* render_view_delegate,
RenderWidgetHostDelegate* render_widget_delegate,
RenderFrameHostManager::Delegate* manager_delegate,
PageDelegate* page_delegate,
Type type)
: delegate_(delegate),
render_frame_delegate_(render_frame_delegate),
render_view_delegate_(render_view_delegate),
render_widget_delegate_(render_widget_delegate),
manager_delegate_(manager_delegate),
page_delegate_(page_delegate),
navigator_(browser_context,
*this,
navigator_delegate,
navigation_controller_delegate),
type_(type),
root_(*this,
nullptr,
// The top-level frame must always be in a
// document scope.
blink::mojom::TreeScopeType::kDocument,
false,
blink::mojom::FrameOwnerProperties(),
blink::FrameOwnerElementType::kNone,
blink::FramePolicy()) {}
FrameTree::~FrameTree() {
is_being_destroyed_ = true;
#if DCHECK_IS_ON()
DCHECK(was_shut_down_);
#endif
}
void FrameTree::ForEachRenderViewHost(
base::FunctionRef<void(RenderViewHostImpl*)> on_host) {
if (speculative_render_view_host_) {
on_host(speculative_render_view_host_.get());
}
for (auto& rvh : render_view_host_map_) {
on_host(rvh.second);
}
}
void FrameTree::MakeSpeculativeRVHCurrent() {
CHECK(speculative_render_view_host_);
// The existing RenderViewHost needs to be unregistered first.
// Speculative RenderViewHosts are only used for same-SiteInstanceGroup
// navigations, so there should be a RenderViewHost of the same
// SiteInstanceGroup already in the tree.
RenderViewHostMapId speculative_id =
speculative_render_view_host_->rvh_map_id();
auto it = render_view_host_map_.find(speculative_id);
CHECK(it != render_view_host_map_.end());
UnregisterRenderViewHost(speculative_id, it->second);
speculative_render_view_host_->set_is_speculative(false);
RegisterRenderViewHost(speculative_id, speculative_render_view_host_.get());
speculative_render_view_host_.reset();
}
FrameTreeNode* FrameTree::FindByID(FrameTreeNodeId frame_tree_node_id) {
for (FrameTreeNode* node : Nodes()) {
if (node->frame_tree_node_id() == frame_tree_node_id)
return node;
}
return nullptr;
}
FrameTreeNode* FrameTree::FindByRoutingID(int process_id, int routing_id) {
RenderFrameHostImpl* render_frame_host =
RenderFrameHostImpl::FromID(process_id, routing_id);
if (render_frame_host) {
FrameTreeNode* result = render_frame_host->frame_tree_node();
if (this == &result->frame_tree())
return result;
}
RenderFrameProxyHost* render_frame_proxy_host =
RenderFrameProxyHost::FromID(process_id, routing_id);
if (render_frame_proxy_host) {
FrameTreeNode* result = render_frame_proxy_host->frame_tree_node();
if (this == &result->frame_tree())
return result;
}
return nullptr;
}
FrameTreeNode* FrameTree::FindByName(const std::string& name) {
if (name.empty())
return &root_;
for (FrameTreeNode* node : Nodes()) {
if (node->frame_name() == name)
return node;
}
return nullptr;
}
FrameTree::NodeRange FrameTree::Nodes() {
return NodesExceptSubtree(nullptr);
}
FrameTree::NodeRange FrameTree::SubtreeNodes(FrameTreeNode* subtree_root) {
return NodeRange({subtree_root}, nullptr,
/*should_descend_into_inner_trees=*/false,
/*include_delegate_nodes_for_inner_frame_trees=*/false);
}
FrameTree::NodeRange FrameTree::NodesIncludingInnerTreeNodes() {
return NodeRange({&root_}, nullptr,
/*should_descend_into_inner_trees=*/true,
/*include_delegate_nodes_for_inner_frame_trees=*/false);
}
std::vector<FrameTreeNode*> FrameTree::CollectNodesForIsLoading() {
FrameTree::NodeRange node_range = NodesIncludingInnerTreeNodes();
FrameTree::NodeIterator node_iter = node_range.begin();
std::vector<FrameTreeNode*> nodes;
CHECK(node_iter != node_range.end());
FrameTree* root_loading_tree = root_.frame_tree().LoadingTree();
while (node_iter != node_range.end()) {
// Skip over frame trees and children which belong to inner web contents
// i.e., when nodes doesn't point to the same loading frame tree.
if ((*node_iter)->frame_tree().LoadingTree() != root_loading_tree) {
node_iter.AdvanceSkippingChildren();
} else {
nodes.push_back(*node_iter);
++node_iter;
}
}
return nodes;
}
FrameTree::NodeRange FrameTree::SubtreeAndInnerTreeNodes(
RenderFrameHostImpl* parent,
bool include_delegate_nodes_for_inner_frame_trees) {
std::vector<raw_ptr<FrameTreeNode, VectorExperimental>> starting_nodes;
starting_nodes.reserve(parent->child_count());
for (size_t i = 0; i < parent->child_count(); ++i) {
FrameTreeNode* child = parent->child_at(i);
FrameTreeNode* inner_tree_main_ftn = GetInnerTreeMainFrameNode(child);
if (inner_tree_main_ftn) {
if (include_delegate_nodes_for_inner_frame_trees)
starting_nodes.push_back(child);
starting_nodes.push_back(inner_tree_main_ftn);
} else {
starting_nodes.push_back(child);
}
}
const std::vector<FrameTreeNode*> unattached_owned_nodes =
parent->delegate()->GetUnattachedOwnedNodes(parent);
starting_nodes.insert(starting_nodes.end(), unattached_owned_nodes.begin(),
unattached_owned_nodes.end());
return NodeRange(starting_nodes, nullptr,
/* should_descend_into_inner_trees */ true,
include_delegate_nodes_for_inner_frame_trees);
}
FrameTree::NodeRange FrameTree::NodesExceptSubtree(FrameTreeNode* node) {
return NodeRange({&root_}, node, /*should_descend_into_inner_trees=*/false,
/*include_delegate_nodes_for_inner_frame_trees=*/false);
}
FrameTree* FrameTree::LoadingTree() {
// We return the delegate's loading frame tree to infer loading related
// states.
return delegate_->LoadingTree();
}
FrameTreeNode* FrameTree::AddFrame(
RenderFrameHostImpl* parent,
int process_id,
int new_routing_id,
mojo::PendingAssociatedRemote<mojom::Frame> frame_remote,
mojo::PendingReceiver<blink::mojom::BrowserInterfaceBroker>
browser_interface_broker_receiver,
blink::mojom::PolicyContainerBindParamsPtr policy_container_bind_params,
mojo::PendingAssociatedReceiver<blink::mojom::AssociatedInterfaceProvider>
associated_interface_provider_receiver,
blink::mojom::TreeScopeType scope,
const std::string& frame_name,
const std::string& frame_unique_name,
bool is_created_by_script,
const blink::LocalFrameToken& frame_token,
const base::UnguessableToken& devtools_frame_token,
const blink::DocumentToken& document_token,
const blink::FramePolicy& frame_policy,
const blink::mojom::FrameOwnerProperties& frame_owner_properties,
bool was_discarded,
blink::FrameOwnerElementType owner_type,
bool is_dummy_frame_for_inner_tree) {
CHECK_NE(new_routing_id, MSG_ROUTING_NONE);
// Normally this path is for blink adding a child local frame. But fenced
// frames add a dummy child frame that never gets a corresponding
// RenderFrameImpl in any renderer process, and therefore its `frame_remote`
// is invalid. Also its RenderFrameHostImpl is exempt from having
// `RenderFrameCreated()` called on it (see later in this method, as well as
// `WebContentsObserverConsistencyChecker::RenderFrameHostChanged()`).
DCHECK_NE(frame_remote.is_valid(), is_dummy_frame_for_inner_tree);
DCHECK_NE(browser_interface_broker_receiver.is_valid(),
is_dummy_frame_for_inner_tree);
DCHECK_NE(associated_interface_provider_receiver.is_valid(),
is_dummy_frame_for_inner_tree);
// A child frame always starts with an initial empty document, which means
// it is in the same SiteInstance as the parent frame. Ensure that the process
// which requested a child frame to be added is the same as the process of the
// parent node.
CHECK_EQ(parent->GetProcess()->GetDeprecatedID(), process_id);
std::unique_ptr<FrameTreeNode> new_node = base::WrapUnique(
new FrameTreeNode(*this, parent, scope, is_created_by_script,
frame_owner_properties, owner_type, frame_policy));
// Set sandbox flags and container policy and make them effective immediately,
// since initial sandbox flags and permissions policy should apply to the
// initial empty document in the frame. This needs to happen before the call
// to AddChild so that the effective policy is sent to any newly-created
// `blink::RemoteFrame` objects when the RenderFrameHost is created.
// SetPendingFramePolicy is necessary here because next navigation on this
// frame will need the value of pending frame policy instead of effective
// frame policy.
new_node->SetPendingFramePolicy(frame_policy);
if (was_discarded)
new_node->set_was_discarded();
// Add the new node to the FrameTree, creating the RenderFrameHost.
FrameTreeNode* added_node = parent->AddChild(
std::move(new_node), new_routing_id, std::move(frame_remote), frame_token,
document_token, devtools_frame_token, frame_policy, frame_name,
frame_unique_name);
added_node->SetFencedFramePropertiesIfNeeded();
if (browser_interface_broker_receiver.is_valid()) {
added_node->current_frame_host()->BindBrowserInterfaceBrokerReceiver(
std::move(browser_interface_broker_receiver));
}
if (policy_container_bind_params) {
added_node->current_frame_host()->policy_container_host()->Bind(
std::move(policy_container_bind_params));
}
if (associated_interface_provider_receiver.is_valid()) {
added_node->current_frame_host()->BindAssociatedInterfaceProviderReceiver(
std::move(associated_interface_provider_receiver));
}
// The last committed NavigationEntry may have a FrameNavigationEntry with the
// same |frame_unique_name|, since we don't remove FrameNavigationEntries if
// their frames are deleted. If there is a stale one, remove it to avoid
// conflicts on future updates.
NavigationEntryImpl* last_committed_entry = static_cast<NavigationEntryImpl*>(
navigator_.controller().GetLastCommittedEntry());
if (last_committed_entry) {
last_committed_entry->RemoveEntryForFrame(
added_node, /* only_if_different_position = */ true);
}
// Now that the new node is part of the FrameTree and has a RenderFrameHost,
// we can announce the creation of the initial RenderFrame which already
// exists in the renderer process.
// For consistency with navigating to a new RenderFrameHost case, we dispatch
// RenderFrameCreated before RenderFrameHostChanged.
if (!is_dummy_frame_for_inner_tree) {
// The outer dummy FrameTreeNode for fenced frames does not have a live
// RenderFrame in the renderer process.
added_node->current_frame_host()->RenderFrameCreated();
}
// Notify the delegate of the creation of the current RenderFrameHost.
// This is only for subframes, as the main frame case is taken care of by
// WebContentsImpl::Init.
manager_delegate_->NotifySwappedFromRenderManager(
nullptr, added_node->current_frame_host());
return added_node;
}
void FrameTree::RemoveFrame(FrameTreeNode* child) {
RenderFrameHostImpl* parent = child->parent();
if (!parent) {
NOTREACHED() << "Unexpected RemoveFrame call for main frame.";
}
parent->RemoveChild(child);
}
void FrameTree::CreateProxiesForSiteInstanceGroup(
FrameTreeNode* source,
SiteInstanceGroup* site_instance_group,
const scoped_refptr<BrowsingContextState>&
source_new_browsing_context_state,
const std::optional<base::UnguessableToken>& navigation_metrics_token) {
// Will be instantiated with the root proxy later and passed to
// `CreateRenderFrameProxy()` to batch create proxies for child frames.
std::unique_ptr<BatchedProxyIPCSender> batched_proxy_ipc_sender;
if (!source || !source->IsMainFrame()) {
RenderViewHostImpl* render_view_host =
GetRenderViewHost(site_instance_group).get();
if (render_view_host) {
root()->render_manager()->EnsureRenderViewInitialized(
render_view_host, site_instance_group, navigation_metrics_token);
} else {
// Due to the check above, we are creating either an opener proxy (when
// source is null) or a main frame proxy due to a subframe navigation
// (when source is not a main frame). In the former case, we should use
// root's current BrowsingContextState, while in the latter case we should
// use BrowsingContextState from the main RenderFrameHost of the subframe
// being navigated. We want to ensure that the `blink::WebView` is created
// in the right SiteInstanceGroup if it doesn't exist, before creating the
// other proxies; if the `blink::WebView` doesn't exist, the only way to
// do this is to also create a proxy for the main frame as well.
const scoped_refptr<BrowsingContextState>& root_browsing_context_state =
source ? source->parent()->GetMainFrame()->browsing_context_state()
: root()->current_frame_host()->browsing_context_state();
// TODO(crbug.com/40248300): Batch main frame proxy creation and
// pass an instance of `BatchedProxyIPCSender` here instead of nullptr.
root()->render_manager()->CreateRenderFrameProxy(
site_instance_group, root_browsing_context_state,
navigation_metrics_token,
/*batched_proxy_ipc_sender=*/nullptr);
// We only need to use `BatchedProxyIPCSender` when navigating to a new
// SiteInstanceGroup. Proxies do not need to be created when navigating to
// a SiteInstanceGroup that has already been encountered, because site
// isolation would guarantee that all nodes already have either proxies
// or real frames. Due to the check above, the `render_view_host` does
// not exist here, which means we have not seen this SiteInstanceGroup
// before, so we instantiate `batched_proxy_ipc_sender` to consolidate
// IPCs for proxy creation.
base::SafeRef<RenderFrameProxyHost> root_proxy =
root_browsing_context_state
->GetRenderFrameProxyHost(site_instance_group)
->GetSafeRef();
batched_proxy_ipc_sender = std::make_unique<BatchedProxyIPCSender>(
std::move(root_proxy), navigation_metrics_token);
}
}
// Check whether we're in an inner delegate and the |site_instance_group|
// corresponds to the outer delegate. Subframe proxies aren't needed if this
// is the case.
bool is_site_instance_group_for_outer_delegate = false;
RenderFrameProxyHost* outer_delegate_proxy =
root()->render_manager()->GetProxyToOuterDelegate();
if (outer_delegate_proxy) {
is_site_instance_group_for_outer_delegate =
(site_instance_group == outer_delegate_proxy->site_instance_group());
}
// Proxies are created in the FrameTree in response to a node navigating to a
// new SiteInstanceGroup. Since |source|'s navigation will replace the
// currently loaded document, the entire subtree under |source| will be
// removed, and thus proxy creation is skipped for all nodes in that subtree.
//
// However, a proxy *is* needed for the |source| node if it is
// cross-SiteInstanceGroup from the current node. This lets cross-process
// navigations in |source| start with a proxy and follow a remote-to-local
// transition, which avoids race conditions in cases where other navigations
// need to reference |source| before it commits. See https://crbug.com/756790
// for more background. Therefore, NodesExceptSubtree(source) will include
// |source| in the nodes traversed (see NodeIterator::operator++).
for (FrameTreeNode* node : NodesExceptSubtree(source)) {
// If a new frame is created in the current SiteInstanceGroup, other frames
// in that SiteInstanceGroup don't need a proxy for the new frame.
RenderFrameHostImpl* current_host =
node->render_manager()->current_frame_host();
SiteInstanceGroup* current_group = current_host->GetSiteInstance()->group();
// Check that the proxy is for a different SiteInstanceGroup. This ensures
// that a navigation within a SiteInstanceGroup does not cause proxies to be
// created. That then allows the Blink side to do a local to local frame
// transition within the same process.
if (current_group != site_instance_group) {
if (node == source && !current_host->IsRenderFrameLive()) {
// We don't create a proxy at |source| when the current RenderFrameHost
// isn't live. This is because either (1) the speculative
// RenderFrameHost will be committed immediately, and the proxy
// destroyed right away, in GetFrameHostForNavigation, which makes the
// races above impossible, or (2) the early commit will be skipped due
// to ShouldSkipEarlyCommitPendingForCrashedFrame, in which case the
// proxy for |source| *is* needed, but it will be created later in
// CreateProxiesForNewRenderFrameHost.
//
// TODO(fergal): Consider creating a proxy for |source| here rather than
// in CreateProxiesForNewRenderFrameHost for case (2) above.
continue;
}
// Do not create proxies for subframes in the outer delegate's
// SiteInstanceGroup, since there is no need to expose these subframes to
// the outer delegate. See also comments in CreateProxiesForChildFrame()
// and https://crbug.com/1013553.
if (!node->IsMainFrame() && is_site_instance_group_for_outer_delegate) {
continue;
}
// If |node| is the FrameTreeNode being navigated, we use
// |browsing_context_state| (as BrowsingContextState might change for
// cross-BrowsingInstance navigations). Otherwise, we should use the
// |node|'s current BrowsingContextState.
node->render_manager()->CreateRenderFrameProxy(
site_instance_group,
node == source ? source_new_browsing_context_state
: node->current_frame_host()->browsing_context_state(),
navigation_metrics_token, batched_proxy_ipc_sender.get());
}
}
if (batched_proxy_ipc_sender) {
batched_proxy_ipc_sender->CreateAllProxies();
}
}
RenderFrameHostImpl* FrameTree::GetMainFrame() const {
return root_.current_frame_host();
}
FrameTreeNode* FrameTree::GetFocusedFrame() {
return FindByID(focused_frame_tree_node_id_);
}
void FrameTree::SetFocusedFrame(FrameTreeNode* node,
SiteInstanceGroup* source) {
CHECK(node->current_frame_host()->IsActive());
if (node == GetFocusedFrame())
return;
std::set<SiteInstanceGroup*> frame_tree_groups =
CollectSiteInstanceGroups(this);
SiteInstanceGroup* current_group =
node->current_frame_host()->GetSiteInstance()->group();
// Update the focused frame in all other SiteInstanceGroups. If focus changes
// to a cross-group frame, this allows the old focused frame's renderer
// process to clear focus from that frame and fire blur events. It also
// ensures that the latest focused frame is available in all renderers to
// compute document.activeElement.
//
// We do not notify the |source| SiteInstanceGroup because it already knows
// the new focused frame (since it initiated the focus change), and we notify
// the new focused frame's SiteInstanceGroup (if it differs from |source|)
// separately below.
for (auto* group : frame_tree_groups) {
if (group != source && group != current_group) {
RenderFrameProxyHost* proxy = node->current_frame_host()
->browsing_context_state()
->GetRenderFrameProxyHost(group);
if (proxy) {
proxy->SetFocusedFrame();
} else {
base::debug::DumpWithoutCrashing();
}
}
}
// If |node| was focused from a cross-group frame (i.e., via
// window.focus()), tell its RenderFrame that it should focus.
if (current_group != source)
node->current_frame_host()->SetFocusedFrame();
focused_frame_tree_node_id_ = node->frame_tree_node_id();
node->DidFocus();
// The accessibility tree data for the root of the frame tree keeps
// track of the focused frame too, so update that every time the
// focused frame changes.
root()
->current_frame_host()
->GetOutermostMainFrameOrEmbedder()
->UpdateAXTreeData();
}
scoped_refptr<RenderViewHostImpl> FrameTree::CreateRenderViewHost(
SiteInstanceGroup* site_instance_group,
int32_t main_frame_routing_id,
bool renderer_initiated_creation,
scoped_refptr<BrowsingContextState> main_browsing_context_state,
CreateRenderViewHostCase create_case,
std::optional<viz::FrameSinkId> frame_sink_id) {
if (main_browsing_context_state) {
DCHECK(main_browsing_context_state->is_main_frame());
}
RenderViewHostImpl* rvh =
static_cast<RenderViewHostImpl*>(RenderViewHostFactory::Create(
this, site_instance_group,
site_instance_group->GetStoragePartitionConfig(),
render_view_delegate_, render_widget_delegate_, main_frame_routing_id,
renderer_initiated_creation, std::move(main_browsing_context_state),
create_case, frame_sink_id));
if (create_case == CreateRenderViewHostCase::kSpeculative) {
set_speculative_render_view_host(rvh->GetWeakPtr());
} else {
// Register non-speculative RenderViewHosts. If they are speculative, they
// will be registered when they become active.
RegisterRenderViewHost(rvh->rvh_map_id(), rvh);
}
return base::WrapRefCounted(rvh);
}
scoped_refptr<RenderViewHostImpl> FrameTree::GetRenderViewHost(
SiteInstanceGroup* group) {
// When called from RenderFrameHostManager::CreateRenderFrameHost, it's
// possible that a RenderProcessHost hasn't yet been created, which means
// a SiteInstanceGroup won't have been created yet.
if (!group)
return nullptr;
auto it = render_view_host_map_.find(GetRenderViewHostMapId(group));
if (it == render_view_host_map_.end())
return nullptr;
return base::WrapRefCounted(it->second);
}
FrameTree::RenderViewHostMapId FrameTree::GetRenderViewHostMapId(
SiteInstanceGroup* site_instance_group) const {
return RenderViewHostMapId::FromUnsafeValue(
site_instance_group->GetId().value());
}
void FrameTree::RegisterRenderViewHost(RenderViewHostMapId id,
RenderViewHostImpl* rvh) {
TRACE_EVENT_INSTANT("navigation", "FrameTree::RegisterRenderViewHost",
ChromeTrackEvent::kRenderViewHost, *rvh);
CHECK(!rvh->is_speculative());
bool rvh_id_already_in_map = base::Contains(render_view_host_map_, id);
bool rfh_in_bfcache =
controller()
.GetBackForwardCache()
.IsRenderFrameHostWithSIGInBackForwardCacheForDebugging(
rvh->site_instance_group()->GetId());
bool rfph_in_bfcache =
controller()
.GetBackForwardCache()
.IsRenderFrameProxyHostWithSIGInBackForwardCacheForDebugging(
rvh->site_instance_group()->GetId());
bool rvh_in_bfcache =
controller()
.GetBackForwardCache()
.IsRenderViewHostWithMapIdInBackForwardCacheForDebugging(*rvh);
// We're seeing cases where an RVH being restored from BFCache has the same
// ID as an RVH already in the map, where the 2 RVHs are different but one
// was in BFCache and one isn't.
// To investigate, detect if any of these cases happen:
// 1) A RenderViewHost with the same ID as `rvh` is already in the map
// 2) A RenderFrameHost with the same SIG ID as `rvh` is in BFCache
// 3) A RenderFrameProxyHost with the same SIG ID as `rvh` is in BFCache
// 4) A RenderViewHost with the same ID as `rvh` is in BFCache
// These cases shouldn't be possible. Note that when checking #2-#4 for
// a RenderViewHost that is getting out of BFCache, we are guaranteed to not
// accidentally match to the RVH/RFPH/RFH of the page being restored,
// because we can only get here after the StoredPage is taken out of the
// BFCache and thus won't be iterated over in the functions above.
// See the linked bug below for more details.
if (rvh_id_already_in_map || rfh_in_bfcache || rfph_in_bfcache ||
rvh_in_bfcache) {
// TODO(https://crbug.com/354382462): Remove crash keys once investigation
// is done.
SCOPED_CRASH_KEY_BOOL("rvh-double", "in_map", rvh_id_already_in_map);
SCOPED_CRASH_KEY_BOOL("rvh-double", "rfh_in_bfcache", rfh_in_bfcache);
SCOPED_CRASH_KEY_BOOL("rvh-double", "rfph_in_bfcache", rfph_in_bfcache);
SCOPED_CRASH_KEY_BOOL("rvh-double", "rvh_in_bfcache", rvh_in_bfcache);
SCOPED_CRASH_KEY_BOOL("rvh-double", "passed_renderer_created",
rvh->renderer_view_created());
SCOPED_CRASH_KEY_NUMBER("rvh-double", "passed_rvh_main_id",
rvh->main_frame_routing_id());
SCOPED_CRASH_KEY_NUMBER("rvh-double", "root_routing_id",
root()->current_frame_host()->GetRoutingID());
SCOPED_CRASH_KEY_NUMBER("rvh-double", "passed_rvh_ptr",
reinterpret_cast<size_t>(rvh));
SCOPED_CRASH_KEY_BOOL("rvh-double", "passed_rvh_bfcache",
rvh->is_in_back_forward_cache());
SCOPED_CRASH_KEY_BOOL("rvh-double", "frame_tree_primary", is_primary());
if (rvh_id_already_in_map) {
SCOPED_CRASH_KEY_BOOL(
"rvh-double", "mapped_rvh_registered",
render_view_host_map_[id]->is_registered_with_frame_tree());
SCOPED_CRASH_KEY_NUMBER(
"rvh-double", "mapped_rvh_main_id",
render_view_host_map_[id]->main_frame_routing_id());
SCOPED_CRASH_KEY_NUMBER(
"rvh-double", "map_rvh_ptr",
reinterpret_cast<size_t>(render_view_host_map_[id]));
SCOPED_CRASH_KEY_BOOL(
"rvh-double", "map_rvh_bfcache",
render_view_host_map_[id]->is_in_back_forward_cache());
SCOPED_CRASH_KEY_BOOL("rvh-double", "mapped_renderer_created",
render_view_host_map_[id]->renderer_view_created());
CHECK_EQ(rvh, render_view_host_map_[id]);
}
}
render_view_host_map_[id] = rvh;
rvh->set_is_registered_with_frame_tree(true);
}
void FrameTree::UnregisterRenderViewHost(RenderViewHostMapId id,
RenderViewHostImpl* rvh) {
TRACE_EVENT_INSTANT("navigation", "FrameTree::UnregisterRenderViewHost",
ChromeTrackEvent::kRenderViewHost, *rvh);
CHECK(!rvh->is_speculative());
auto it = render_view_host_map_.find(id);
CHECK(it != render_view_host_map_.end());
CHECK_EQ(it->second, rvh);
render_view_host_map_.erase(it);
rvh->set_is_registered_with_frame_tree(false);
}
void FrameTree::FrameUnloading(FrameTreeNode* frame) {
if (frame->frame_tree_node_id() == focused_frame_tree_node_id_)
focused_frame_tree_node_id_ = FrameTreeNodeId();
// Ensure frames that are about to be deleted aren't visible from the other
// processes anymore.
frame->GetBrowsingContextStateForSubframe()->ResetProxyHosts();
}
void FrameTree::FrameRemoved(FrameTreeNode* frame) {
if (frame->frame_tree_node_id() == focused_frame_tree_node_id_)
focused_frame_tree_node_id_ = FrameTreeNodeId();
}
double FrameTree::GetLoadProgress() {
if (root_.HasNavigation())
return blink::kInitialLoadProgress;
return root_.current_frame_host()->GetPage().load_progress();
}
bool FrameTree::IsLoadingIncludingInnerFrameTrees() const {
return GetLoadingState() != LoadingState::NONE;
}
LoadingState FrameTree::GetLoadingState() const {
// The overall loading state for the FrameTree matches the root node's loading
// state if the root is loading.
if (root_.GetLoadingState() != LoadingState::NONE) {
return root_.GetLoadingState();
}
// Otherwise, check if a subframe is loading without an associated navigation
// in the root frame. If so, we are loading, but we don't want to show
// loading UI.
for (const FrameTreeNode* node_to_check :
const_cast<FrameTree*>(this)->CollectNodesForIsLoading()) {
if (node_to_check->IsLoading()) {
return LoadingState::LOADING_WITHOUT_UI;
}
}
return LoadingState::NONE;
}
void FrameTree::ReplicatePageFocus(bool is_focused) {
// Focus loss may occur while this FrameTree is being destroyed. Don't
// send the message in this case, as the main frame's RenderFrameHost and
// other state has already been cleared.
if (is_being_destroyed_)
return;
std::set<SiteInstanceGroup*> frame_tree_site_instance_groups =
CollectSiteInstanceGroups(this);
// Send the focus update to main frame's proxies in all SiteInstanceGroups of
// other frames in this FrameTree. Note that the main frame might also know
// about proxies in SiteInstanceGroups for frames in a different FrameTree
// (e.g., for window.open), so we can't just iterate over its proxy_hosts_ in
// RenderFrameHostManager.
for (auto* group : frame_tree_site_instance_groups)
SetPageFocus(group, is_focused);
}
void FrameTree::SetPageFocus(SiteInstanceGroup* group, bool is_focused) {
RenderFrameHostManager* root_manager = root_.render_manager();
// This is only used to set page-level focus in cross-process subframes, and
// requests to set focus in main frame's SiteInstanceGroup are ignored.
if (group != root_manager->current_frame_host()->GetSiteInstance()->group()) {
RenderFrameProxyHost* proxy = root_manager->current_frame_host()
->browsing_context_state()
->GetRenderFrameProxyHost(group);
if (proxy->is_render_frame_proxy_live())
proxy->GetAssociatedRemoteFrame()->SetPageFocus(is_focused);
}
}
void FrameTree::RegisterExistingOriginAsHavingDefaultIsolation(
const url::Origin& previously_visited_origin,
NavigationRequest* navigation_request_to_exclude) {
controller().RegisterExistingOriginAsHavingDefaultIsolation(
previously_visited_origin);
std::unordered_set<SiteInstanceImpl*> matching_site_instances;
// Be sure to visit all RenderFrameHosts associated with this frame that might
// have an origin that could script other frames. We skip RenderFrameHosts
// that are in the bfcache, assuming there's no way for a frame to join the
// BrowsingInstance of a bfcache RFH while it's in the cache.
for (auto* frame_tree_node : SubtreeNodes(root())) {
auto* frame_host = frame_tree_node->current_frame_host();
if (previously_visited_origin == frame_host->GetLastCommittedOrigin())
matching_site_instances.insert(frame_host->GetSiteInstance());
if (frame_host->HasCommittingNavigationRequestForOrigin(
previously_visited_origin, navigation_request_to_exclude)) {
matching_site_instances.insert(frame_host->GetSiteInstance());
}
auto* spec_frame_host =
frame_tree_node->render_manager()->speculative_frame_host();
if (spec_frame_host &&
spec_frame_host->HasCommittingNavigationRequestForOrigin(
previously_visited_origin, navigation_request_to_exclude)) {
matching_site_instances.insert(spec_frame_host->GetSiteInstance());
}
auto* navigation_request = frame_tree_node->navigation_request();
if (navigation_request &&
navigation_request != navigation_request_to_exclude &&
navigation_request->HasCommittingOrigin(previously_visited_origin)) {
matching_site_instances.insert(frame_host->GetSiteInstance());
}
}
// Update any SiteInstances found to contain |origin|.
for (auto* site_instance : matching_site_instances) {
site_instance->RegisterAsDefaultOriginIsolation(previously_visited_origin);
}
}
void FrameTree::Init(SiteInstanceImpl* main_frame_site_instance,
bool renderer_initiated_creation,
const std::string& main_frame_name,
RenderFrameHostImpl* opener_for_origin,
const blink::FramePolicy& frame_policy,
const base::UnguessableToken& devtools_frame_token) {
// blink::FrameTree::SetName always keeps |unique_name| empty in case of a
// main frame - let's do the same thing here.
std::string unique_name;
root_.render_manager()->InitRoot(main_frame_site_instance,
renderer_initiated_creation, frame_policy,
main_frame_name, devtools_frame_token);
root_.SetFencedFramePropertiesIfNeeded();
// The initial empty document should inherit the origin (the origin may
// change after the first commit) and other state (such as the
// RuntimeFeatureStateReadContext) from its opener, except when they are in
// different browsing context groups (`renderer_initiated_creation` will be
// false), where it should use a new opaque origin and default values for the
// other state, respectively.
// See also https://crbug.com/932067.
//
// Note that the origin of the new frame might depend on sandbox flags.
// Checking sandbox flags of the new frame should be safe at this point,
// because the flags should be already inherited when creating the root node.
DCHECK(!renderer_initiated_creation || opener_for_origin);
root_.current_frame_host()->SetOriginDependentStateOfNewFrame(
renderer_initiated_creation ? opener_for_origin : nullptr);
controller().CreateInitialEntry();
}
void FrameTree::DidAccessInitialMainDocument() {
OPTIONAL_TRACE_EVENT0("content", "FrameTree::DidAccessInitialDocument");
has_accessed_initial_main_document_ = true;
controller().DidAccessInitialMainDocument();
}
void FrameTree::NodeLoadingStateChanged(
FrameTreeNode& node,
LoadingState previous_frame_tree_loading_state) {
LoadingState new_frame_tree_loading_state = GetLoadingState();
if (previous_frame_tree_loading_state == new_frame_tree_loading_state) {
return;
}
root()->render_manager()->SetIsLoading(new_frame_tree_loading_state !=
LoadingState::NONE);
delegate_->LoadingStateChanged(new_frame_tree_loading_state);
if (previous_frame_tree_loading_state == LoadingState::NONE) {
delegate_->DidStartLoading(&node);
} else if (new_frame_tree_loading_state == LoadingState::NONE) {
delegate_->DidStopLoading();
}
}
void FrameTree::DidCancelLoading() {
OPTIONAL_TRACE_EVENT0("content", "FrameTree::DidCancelLoading");
navigator_.controller().DiscardNonCommittedEntries();
}
void FrameTree::StopLoading() {
for (FrameTreeNode* node : Nodes())
node->StopLoading();
}
void FrameTree::Shutdown() {
is_being_destroyed_ = true;
#if DCHECK_IS_ON()
DCHECK(!was_shut_down_);
was_shut_down_ = true;
#endif
RenderFrameHostManager* root_manager = root_.render_manager();
if (!root_manager->current_frame_host()) {
// The page has been transferred out during an activation. There is little
// left to do.
// TODO(crbug.com/40177949): If we decide that pending delete RFHs
// need to be moved along during activation replace this line with a DCHECK
// that there are no pending delete instances.
root_manager->ClearRFHsPendingShutdown();
DCHECK(!root_.navigation_request());
DCHECK(!root_manager->speculative_frame_host());
manager_delegate_->OnFrameTreeNodeDestroyed(&root_);
return;
}
for (FrameTreeNode* node : Nodes()) {
// Delete all RFHs pending shutdown, which will lead the corresponding RVHs
// to be shutdown and be deleted as well.
node->render_manager()->ClearRFHsPendingShutdown();
// TODO(crbug.com/40177939): Ban WebUI instance in Prerender pages.
node->render_manager()->ClearWebUIInstances();
}
// Destroy all subframes now. This notifies observers.
root_manager->current_frame_host()->ResetChildren();
root_manager->current_frame_host()
->browsing_context_state()
->ResetProxyHosts();
// Manually call the observer methods for the root FrameTreeNode. It is
// necessary to manually delete all objects tracking navigations
// (NavigationHandle, NavigationRequest) for observers to be properly
// notified of these navigations stopping before the WebContents is
// destroyed.
root_manager->current_frame_host()->RenderFrameDeleted();
root_manager->current_frame_host()->ResetOwnedNavigationRequests(
NavigationDiscardReason::kWillRemoveFrame);
// Do not update state as the FrameTree::Delegate (possibly a WebContents) is
// being destroyed.
root_.ResetNavigationRequestButKeepState(
NavigationDiscardReason::kWillRemoveFrame);
if (root_manager->speculative_frame_host()) {
root_manager->DiscardSpeculativeRenderFrameHostForShutdown();
}
// NavigationRequests restoring the page from bfcache have a reference to the
// RFHs stored in the cache, so the cache should be cleared after the
// navigation request is reset.
controller().GetBackForwardCache().Shutdown();
manager_delegate_->OnFrameTreeNodeDestroyed(&root_);
render_view_delegate_->RenderViewDeleted(
root_manager->current_frame_host()->render_view_host());
}
base::SafeRef<FrameTree> FrameTree::GetSafeRef() {
return weak_ptr_factory_.GetSafeRef();
}
void FrameTree::FocusOuterFrameTrees() {
OPTIONAL_TRACE_EVENT0("content", "FrameTree::FocusOuterFrameTrees");
FrameTree* frame_tree_to_focus = this;
while (true) {
FrameTreeNode* outer_node = FrameTreeNode::GloballyFindByID(
frame_tree_to_focus->delegate()->GetOuterDelegateFrameTreeNodeId());
if (!outer_node || !outer_node->current_frame_host()->IsActive()) {
// Don't set focus on an inactive FrameTreeNode.
return;
}
outer_node->frame_tree().SetFocusedFrame(outer_node, nullptr);
// For a browser initiated focus change, let embedding renderer know of the
// change. Otherwise, if the currently focused element is just across a
// process boundary in focus order, it will not be possible to move across
// that boundary. This is because the target element will already be focused
// (that renderer was not notified) and drop the event.
if (auto* proxy_to_outer_delegate = frame_tree_to_focus->root()
->render_manager()
->GetProxyToOuterDelegate()) {
proxy_to_outer_delegate->SetFocusedFrame();
}
frame_tree_to_focus = &outer_node->frame_tree();
}
}
void FrameTree::Discard() {
const auto attempt_discard = [this]() {
// A speculative pending-commit rfh should not be cancelled or deleted. In
// this case ignore the discard request and allow the navigation to complete
// as normal.
if (const auto* speculative_rfh =
root()->render_manager()->speculative_frame_host();
speculative_rfh && speculative_rfh->HasPendingCommitNavigation()) {
return false;
}
root()->set_was_discarded();
root()->current_frame_host()->DiscardFrame();
NavigationControllerImpl& navigation_controller = controller();
navigation_controller.SetNeedsReload();
navigation_controller.GetBackForwardCache().Flush();
return true;
};
base::UmaHistogramBoolean("Discarding.DiscardFrameTree", attempt_discard());
}
} // namespace content