123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598 |
- From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
- From: Raymond Zhao <[email protected]>
- Date: Tue, 7 Sep 2021 14:54:25 -0700
- Subject: feat: Add data transfer mechanism to requestSingleInstanceLock flow
- This patch adds code that allows for the second instance to send
- additional data to the first instance, and for the first instance
- to send additional data back to the second instance, during the
- app.requestSingleInstanceLock call.
- Firstly, this patch adds an additional_data parameter
- to the constructor of ProcessSingleton, so that the second instance
- can send additional data over to the first instance
- while requesting the ProcessSingleton lock.
- Then, we add additional processing to the second-instance event, both
- so the first instance can receive additional data from the second
- instance, but also so the second instance can send back additional
- data to the first instance if needed.
- diff --git a/chrome/browser/process_singleton.h b/chrome/browser/process_singleton.h
- index 8f94cc300b58e8a94b6ca155aa3cf370bcb948d8..4340376f323d24e5e2c5897a81c6a9ebf13adab4 100644
- --- a/chrome/browser/process_singleton.h
- +++ b/chrome/browser/process_singleton.h
- @@ -18,6 +18,7 @@
- #include "base/files/file_path.h"
- #include "base/memory/ref_counted.h"
- #include "base/process/process.h"
- +#include "base/containers/span.h"
- #include "ui/gfx/native_widget_types.h"
-
- #if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
- @@ -93,6 +94,9 @@ class ProcessSingleton {
-
- static constexpr int kNumNotifyResults = LAST_VALUE + 1;
-
- + using NotificationAckCallback =
- + base::RepeatingCallback<void(const base::span<const uint8_t>* ack_data)>;
- +
- // Implement this callback to handle notifications from other processes. The
- // callback will receive the command line and directory with which the other
- // Chrome process was launched. Return true if the command line will be
- @@ -100,21 +104,27 @@ class ProcessSingleton {
- // should handle it (i.e., because the current process is shutting down).
- using NotificationCallback =
- base::RepeatingCallback<bool(const base::CommandLine& command_line,
- - const base::FilePath& current_directory)>;
- + const base::FilePath& current_directory,
- + const std::vector<const uint8_t> additional_data,
- + const NotificationAckCallback& ack_callback)>;
-
- #if defined(OS_WIN)
- ProcessSingleton(const std::string& program_name,
- const base::FilePath& user_data_dir,
- + const base::span<const uint8_t> additional_data,
- bool is_sandboxed,
- - const NotificationCallback& notification_callback);
- + const NotificationCallback& notification_callback,
- + const NotificationAckCallback& ack_notification_callback);
- #else
- ProcessSingleton(const base::FilePath& user_data_dir,
- - const NotificationCallback& notification_callback);
- + const base::span<const uint8_t> additional_data,
- + const NotificationCallback& notification_callback,
- + const NotificationAckCallback& ack_notification_callback);
- +#endif
-
- ProcessSingleton(const ProcessSingleton&) = delete;
- ProcessSingleton& operator=(const ProcessSingleton&) = delete;
-
- -#endif
- ~ProcessSingleton();
-
- // Notify another process, if available. Otherwise sets ourselves as the
- @@ -177,7 +187,13 @@ class ProcessSingleton {
- #endif
-
- private:
- - NotificationCallback notification_callback_; // Handler for notifications.
- + // A callback to run when the first instance receives data from the second.
- + NotificationCallback notification_callback_;
- + // A callback to run when the second instance
- + // receives an acknowledgement from the first.
- + NotificationAckCallback notification_ack_callback_;
- + // Custom data to pass to the other instance during notify.
- + base::span<const uint8_t> additional_data_;
-
- #if BUILDFLAG(IS_WIN)
- bool EscapeVirtualization(const base::FilePath& user_data_dir);
- @@ -190,6 +206,7 @@ class ProcessSingleton {
- HANDLE lock_file_;
- base::FilePath user_data_dir_;
- ShouldKillRemoteProcessCallback should_kill_remote_process_callback_;
- + HANDLE ack_pipe_;
- #elif BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
- // Return true if the given pid is one of our child processes.
- // Assumes that the current pid is the root of all pids of the current
- diff --git a/chrome/browser/process_singleton_posix.cc b/chrome/browser/process_singleton_posix.cc
- index 81fb8994c53fb16d7c96de008c96127d0b85b8f9..b56577857c54a245ba8554df164a184e455dfd03 100644
- --- a/chrome/browser/process_singleton_posix.cc
- +++ b/chrome/browser/process_singleton_posix.cc
- @@ -147,7 +147,7 @@ const char kACKToken[] = "ACK";
- const char kShutdownToken[] = "SHUTDOWN";
- const char kTokenDelimiter = '\0';
- const int kMaxMessageLength = 32 * 1024;
- -const int kMaxACKMessageLength = base::size(kShutdownToken) - 1;
- +const int kMaxACKMessageLength = kMaxMessageLength;
-
- bool g_disable_prompt = false;
- bool g_skip_is_chrome_process_check = false;
- @@ -627,6 +627,7 @@ class ProcessSingleton::LinuxWatcher
- // |reader| is for sending back ACK message.
- void HandleMessage(const std::string& current_dir,
- const std::vector<std::string>& argv,
- + const std::vector<const uint8_t> additional_data,
- SocketReader* reader);
-
- private:
- @@ -651,6 +652,9 @@ class ProcessSingleton::LinuxWatcher
- // The ProcessSingleton that owns us.
- ProcessSingleton* const parent_;
-
- + bool ack_callback_called_ = false;
- + void AckCallback(SocketReader* reader, const base::span<const uint8_t>* response);
- +
- std::set<std::unique_ptr<SocketReader>, base::UniquePtrComparator> readers_;
- };
-
- @@ -681,16 +685,21 @@ void ProcessSingleton::LinuxWatcher::StartListening(int socket) {
- }
-
- void ProcessSingleton::LinuxWatcher::HandleMessage(
- - const std::string& current_dir, const std::vector<std::string>& argv,
- + const std::string& current_dir,
- + const std::vector<std::string>& argv,
- + const std::vector<const uint8_t> additional_data,
- SocketReader* reader) {
- DCHECK(ui_task_runner_->BelongsToCurrentThread());
- DCHECK(reader);
-
- - if (parent_->notification_callback_.Run(base::CommandLine(argv),
- - base::FilePath(current_dir))) {
- - // Send back "ACK" message to prevent the client process from starting up.
- - reader->FinishWithACK(kACKToken, base::size(kACKToken) - 1);
- - } else {
- + auto wrapped_ack_callback =
- + base::BindRepeating(&ProcessSingleton::LinuxWatcher::AckCallback,
- + base::Unretained(this), reader);
- + ack_callback_called_ = false;
- + if (!parent_->notification_callback_.Run(base::CommandLine(argv),
- + base::FilePath(current_dir),
- + std::move(additional_data),
- + wrapped_ack_callback)) {
- LOG(WARNING) << "Not handling interprocess notification as browser"
- " is shutting down";
- // Send back "SHUTDOWN" message, so that the client process can start up
- @@ -700,6 +709,22 @@ void ProcessSingleton::LinuxWatcher::HandleMessage(
- }
- }
-
- +void ProcessSingleton::LinuxWatcher::AckCallback(
- + SocketReader* reader,
- + const base::span<const uint8_t>* response) {
- + // Send back "ACK" message to prevent the client process from starting up.
- + if (!ack_callback_called_) {
- + ack_callback_called_ = true;
- + std::string ack_message;
- + ack_message.append(kACKToken, base::size(kACKToken) - 1);
- + if (response && response->size_bytes()) {
- + ack_message.append(reinterpret_cast<const char*>(response->data()),
- + response->size_bytes());
- + }
- + reader->FinishWithACK(ack_message.c_str(), ack_message.size());
- + }
- +}
- +
- void ProcessSingleton::LinuxWatcher::RemoveSocketReader(SocketReader* reader) {
- DCHECK_CURRENTLY_ON(BrowserThread::IO);
- DCHECK(reader);
- @@ -735,7 +760,8 @@ void ProcessSingleton::LinuxWatcher::SocketReader::
- }
- }
-
- - // Validate the message. The shortest message is kStartToken\0x\0x
- + // Validate the message. The shortest message kStartToken\0\00
- + // The shortest message with additional data is kStartToken\0\00\00\0.
- const size_t kMinMessageLength = base::size(kStartToken) + 4;
- if (bytes_read_ < kMinMessageLength) {
- buf_[bytes_read_] = 0;
- @@ -765,10 +791,28 @@ void ProcessSingleton::LinuxWatcher::SocketReader::
- tokens.erase(tokens.begin());
- tokens.erase(tokens.begin());
-
- + size_t num_args;
- + base::StringToSizeT(tokens[0], &num_args);
- + std::vector<std::string> command_line(tokens.begin() + 1, tokens.begin() + 1 + num_args);
- +
- + std::vector<const uint8_t> additional_data;
- + if (tokens.size() >= 3 + num_args) {
- + size_t additional_data_size;
- + base::StringToSizeT(tokens[1 + num_args], &additional_data_size);
- + std::string remaining_args = base::JoinString(
- + base::make_span(tokens.begin() + 2 + num_args, tokens.end()),
- + std::string(1, kTokenDelimiter));
- + const uint8_t* additional_data_bits =
- + reinterpret_cast<const uint8_t*>(remaining_args.c_str());
- + additional_data = std::vector<const uint8_t>(additional_data_bits,
- + additional_data_bits + additional_data_size);
- + }
- +
- // Return to the UI thread to handle opening a new browser tab.
- ui_task_runner_->PostTask(
- FROM_HERE, base::BindOnce(&ProcessSingleton::LinuxWatcher::HandleMessage,
- - parent_, current_dir, tokens, this));
- + parent_, current_dir, command_line,
- + std::move(additional_data), this));
- fd_watch_controller_.reset();
-
- // LinuxWatcher::HandleMessage() is in charge of destroying this SocketReader
- @@ -797,8 +841,12 @@ void ProcessSingleton::LinuxWatcher::SocketReader::FinishWithACK(
- //
- ProcessSingleton::ProcessSingleton(
- const base::FilePath& user_data_dir,
- - const NotificationCallback& notification_callback)
- + const base::span<const uint8_t> additional_data,
- + const NotificationCallback& notification_callback,
- + const NotificationAckCallback& notification_ack_callback)
- : notification_callback_(notification_callback),
- + notification_ack_callback_(notification_ack_callback),
- + additional_data_(additional_data),
- current_pid_(base::GetCurrentProcId()),
- watcher_(new LinuxWatcher(this)) {
- socket_path_ = user_data_dir.Append(chrome::kSingletonSocketFilename);
- @@ -915,7 +963,8 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessWithTimeout(
- sizeof(socket_timeout));
-
- // Found another process, prepare our command line
- - // format is "START\0<current dir>\0<argv[0]>\0...\0<argv[n]>".
- + // format is "START\0<current-dir>\0<n-args>\0<argv[0]>\0...\0<argv[n]>
- + // \0<additional-data-length>\0<additional-data>".
- std::string to_send(kStartToken);
- to_send.push_back(kTokenDelimiter);
-
- @@ -925,11 +974,21 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessWithTimeout(
- to_send.append(current_dir.value());
-
- const std::vector<std::string>& argv = cmd_line.argv();
- + to_send.push_back(kTokenDelimiter);
- + to_send.append(base::NumberToString(argv.size()));
- for (auto it = argv.begin(); it != argv.end(); ++it) {
- to_send.push_back(kTokenDelimiter);
- to_send.append(*it);
- }
-
- + size_t data_to_send_size = additional_data_.size_bytes();
- + if (data_to_send_size) {
- + to_send.push_back(kTokenDelimiter);
- + to_send.append(base::NumberToString(data_to_send_size));
- + to_send.push_back(kTokenDelimiter);
- + to_send.append(reinterpret_cast<const char*>(additional_data_.data()), data_to_send_size);
- + }
- +
- // Send the message
- if (!WriteToSocket(socket.fd(), to_send.data(), to_send.length())) {
- // Try to kill the other process, because it might have been dead.
- @@ -969,6 +1028,17 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessWithTimeout(
- linux_ui->NotifyWindowManagerStartupComplete();
- #endif
-
- + size_t ack_data_len = len - (base::size(kACKToken) - 1);
- + if (ack_data_len) {
- + const uint8_t* raw_ack_data =
- + reinterpret_cast<const uint8_t*>(buf + base::size(kACKToken) - 1);
- + base::span<const uint8_t> ack_data =
- + base::make_span(raw_ack_data, raw_ack_data + ack_data_len);
- + notification_ack_callback_.Run(&ack_data);
- + } else {
- + notification_ack_callback_.Run(nullptr);
- + }
- +
- // Assume the other process is handling the request.
- return PROCESS_NOTIFIED;
- }
- diff --git a/chrome/browser/process_singleton_win.cc b/chrome/browser/process_singleton_win.cc
- index 679350dd08ca0211653ea669405e3f4f86c2fc0f..16ad742721e9c5af13224f74e864e648c27a2a34 100644
- --- a/chrome/browser/process_singleton_win.cc
- +++ b/chrome/browser/process_singleton_win.cc
- @@ -22,6 +22,7 @@
- #include "base/strings/utf_string_conversions.h"
- #include "base/time/time.h"
- #include "base/trace_event/trace_event.h"
- +#include "base/timer/timer.h"
- #include "base/win/registry.h"
- #include "base/win/scoped_handle.h"
- #include "base/win/windows_version.h"
- @@ -44,6 +45,14 @@
- namespace {
-
- const char kLockfile[] = "lockfile";
- +const LPCWSTR kPipeName = L"\\\\.\\pipe\\electronAckPipe";
- +const DWORD kPipeTimeout = 10000;
- +const DWORD kMaxMessageLength = 32 * 1024;
- +
- +std::unique_ptr<std::vector<const uint8_t>> g_ack_data;
- +base::OneShotTimer g_ack_timer;
- +HANDLE g_write_ack_pipe;
- +bool g_write_ack_callback_called = false;
-
- // A helper class that acquires the given |mutex| while the AutoLockMutex is in
- // scope.
- @@ -98,10 +107,12 @@ BOOL CALLBACK BrowserWindowEnumeration(HWND window, LPARAM param) {
-
- bool ParseCommandLine(const COPYDATASTRUCT* cds,
- base::CommandLine* parsed_command_line,
- - base::FilePath* current_directory) {
- + base::FilePath* current_directory,
- + std::vector<const uint8_t>* parsed_additional_data) {
- // We should have enough room for the shortest command (min_message_size)
- // and also be a multiple of wchar_t bytes. The shortest command
- - // possible is L"START\0\0" (empty current directory and command line).
- + // possible is L"START\0\0" (empty command line, current directory,
- + // and additional data).
- static const int min_message_size = 7;
- if (cds->cbData < min_message_size * sizeof(wchar_t) ||
- cds->cbData % sizeof(wchar_t) != 0) {
- @@ -151,11 +162,82 @@ bool ParseCommandLine(const COPYDATASTRUCT* cds,
- const std::wstring cmd_line =
- msg.substr(second_null + 1, third_null - second_null);
- *parsed_command_line = base::CommandLine::FromString(cmd_line);
- +
- + const std::wstring::size_type fourth_null =
- + msg.find_first_of(L'\0', third_null + 1);
- + if (fourth_null == std::wstring::npos ||
- + fourth_null == msg.length()) {
- + // No additional data was provided.
- + return true;
- + }
- +
- + // Get length of the additional data.
- + const std::wstring additional_data_length_string =
- + msg.substr(third_null + 1, fourth_null - third_null);
- + size_t additional_data_length;
- + base::StringToSizeT(additional_data_length_string, &additional_data_length);
- +
- + const std::wstring::size_type fifth_null =
- + msg.find_first_of(L'\0', fourth_null + 1);
- + if (fifth_null == std::wstring::npos ||
- + fifth_null == msg.length()) {
- + LOG(WARNING) << "Invalid format for start command, we need a string in 6 "
- + "parts separated by NULLs";
- + }
- +
- + // Get the actual additional data.
- + const std::wstring additional_data =
- + msg.substr(fourth_null + 1, fifth_null - fourth_null);
- + const uint8_t* additional_data_bytes =
- + reinterpret_cast<const uint8_t*>(additional_data.c_str());
- + *parsed_additional_data = std::vector<const uint8_t>(additional_data_bytes,
- + additional_data_bytes + additional_data_length);
- +
- return true;
- }
- return false;
- }
-
- +void StoreAck(const base::span<const uint8_t>* ack_data) {
- + if (ack_data) {
- + g_ack_data = std::make_unique<std::vector<const uint8_t>>(ack_data->begin(),
- + ack_data->end());
- + } else {
- + g_ack_data = nullptr;
- + }
- +}
- +
- +void SendBackAck() {
- + // This is the first instance sending the ack back to the second instance.
- + if (!g_write_ack_callback_called) {
- + g_write_ack_callback_called = true;
- + const uint8_t* data_buffer = nullptr;
- + DWORD data_to_send_size = 0;
- + if (g_ack_data) {
- + data_buffer = g_ack_data->data();
- + DWORD ack_data_size = g_ack_data->size() * sizeof(uint8_t);
- + data_to_send_size = (ack_data_size < kMaxMessageLength) ? ack_data_size : kMaxMessageLength;
- + }
- +
- + ::ConnectNamedPipe(g_write_ack_pipe, NULL);
- +
- + DWORD bytes_written = 0;
- + ::WriteFile(g_write_ack_pipe,
- + (LPCVOID)data_buffer,
- + data_to_send_size,
- + &bytes_written,
- + NULL);
- + DCHECK(bytes_written == data_to_send_size);
- +
- + ::FlushFileBuffers(g_write_ack_pipe);
- + ::DisconnectNamedPipe(g_write_ack_pipe);
- +
- + if (g_ack_data) {
- + g_ack_data.reset();
- + }
- + }
- +}
- +
- bool ProcessLaunchNotification(
- const ProcessSingleton::NotificationCallback& notification_callback,
- UINT message,
- @@ -167,16 +249,23 @@ bool ProcessLaunchNotification(
-
- // Handle the WM_COPYDATA message from another process.
- const COPYDATASTRUCT* cds = reinterpret_cast<COPYDATASTRUCT*>(lparam);
- -
- base::CommandLine parsed_command_line(base::CommandLine::NO_PROGRAM);
- base::FilePath current_directory;
- - if (!ParseCommandLine(cds, &parsed_command_line, ¤t_directory)) {
- + std::vector<const uint8_t> additional_data;
- + if (!ParseCommandLine(cds, &parsed_command_line, ¤t_directory,
- + &additional_data)) {
- *result = TRUE;
- return true;
- }
-
- - *result = notification_callback.Run(parsed_command_line, current_directory) ?
- - TRUE : FALSE;
- + g_write_ack_callback_called = false;
- + *result = notification_callback.Run(parsed_command_line, current_directory,
- + std::move(additional_data),
- + base::BindRepeating(&StoreAck))
- + ? TRUE
- + : FALSE;
- + g_ack_timer.Start(FROM_HERE, base::Seconds(0),
- + base::BindOnce(&SendBackAck));
- return true;
- }
-
- @@ -273,9 +362,13 @@ bool ProcessSingleton::EscapeVirtualization(
- ProcessSingleton::ProcessSingleton(
- const std::string& program_name,
- const base::FilePath& user_data_dir,
- + const base::span<const uint8_t> additional_data,
- bool is_app_sandboxed,
- - const NotificationCallback& notification_callback)
- + const NotificationCallback& notification_callback,
- + const NotificationAckCallback& notification_ack_callback)
- : notification_callback_(notification_callback),
- + notification_ack_callback_(notification_ack_callback),
- + additional_data_(additional_data),
- program_name_(program_name),
- is_app_sandboxed_(is_app_sandboxed),
- is_virtualized_(false),
- @@ -290,6 +383,37 @@ ProcessSingleton::~ProcessSingleton() {
- ::CloseHandle(lock_file_);
- }
-
- +void ReadAck(const ProcessSingleton::NotificationAckCallback& ack_callback) {
- + // We are reading the ack from the first instance.
- + // First, wait for the pipe.
- + ::WaitNamedPipe(kPipeName, NMPWAIT_USE_DEFAULT_WAIT);
- +
- + HANDLE read_ack_pipe = ::CreateFile(kPipeName,
- + GENERIC_READ,
- + FILE_SHARE_READ,
- + NULL,
- + OPEN_EXISTING,
- + FILE_ATTRIBUTE_NORMAL,
- + NULL);
- + CHECK(read_ack_pipe != INVALID_HANDLE_VALUE);
- +
- + DWORD bytes_read;
- + uint8_t read_ack_buffer[kMaxMessageLength];
- + ::ReadFile(read_ack_pipe,
- + (LPVOID)read_ack_buffer,
- + kMaxMessageLength,
- + &bytes_read,
- + NULL);
- +
- + if (!bytes_read) {
- + ack_callback.Run(nullptr);
- + } else {
- + base::span<const uint8_t> out_span(read_ack_buffer, read_ack_buffer + bytes_read);
- + ack_callback.Run(&out_span);
- + }
- + ::CloseHandle(read_ack_pipe);
- +}
- +
- // Code roughly based on Mozilla.
- ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcess() {
- if (is_virtualized_)
- @@ -300,8 +424,9 @@ ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcess() {
- return PROCESS_NONE;
- }
-
- - switch (chrome::AttemptToNotifyRunningChrome(remote_window_)) {
- + switch (chrome::AttemptToNotifyRunningChrome(remote_window_, additional_data_)) {
- case chrome::NOTIFY_SUCCESS:
- + ReadAck(notification_ack_callback_);
- return PROCESS_NOTIFIED;
- case chrome::NOTIFY_FAILED:
- remote_window_ = NULL;
- @@ -431,6 +556,18 @@ bool ProcessSingleton::Create() {
- << "Lock file can not be created! Error code: " << error;
-
- if (lock_file_ != INVALID_HANDLE_VALUE) {
- + // We are the first instance. Create a pipe to send out ack data.
- + ack_pipe_ = ::CreateNamedPipe(kPipeName,
- + PIPE_ACCESS_OUTBOUND,
- + PIPE_TYPE_BYTE | PIPE_REJECT_REMOTE_CLIENTS,
- + PIPE_UNLIMITED_INSTANCES,
- + kMaxMessageLength,
- + 0,
- + kPipeTimeout,
- + NULL);
- + CHECK(ack_pipe_ != INVALID_HANDLE_VALUE);
- + g_write_ack_pipe = ack_pipe_;
- +
- // Set the window's title to the path of our user data directory so
- // other Chrome instances can decide if they should forward to us.
- bool result =
- @@ -457,6 +594,7 @@ bool ProcessSingleton::Create() {
- }
-
- void ProcessSingleton::Cleanup() {
- + ::CloseHandle(ack_pipe_);
- }
-
- void ProcessSingleton::OverrideShouldKillRemoteProcessCallbackForTesting(
- diff --git a/chrome/browser/win/chrome_process_finder.cc b/chrome/browser/win/chrome_process_finder.cc
- index b4fec8878c37b9d157ea768e3b6d99399a988c75..e1cb0f21f752aaeee2c360ce9c5fd08bfede26e3 100644
- --- a/chrome/browser/win/chrome_process_finder.cc
- +++ b/chrome/browser/win/chrome_process_finder.cc
- @@ -34,7 +34,9 @@ HWND FindRunningChromeWindow(const base::FilePath& user_data_dir) {
- return base::win::MessageWindow::FindWindow(user_data_dir.value());
- }
-
- -NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window) {
- +NotifyChromeResult AttemptToNotifyRunningChrome(
- + HWND remote_window,
- + const base::span<const uint8_t> additional_data) {
- DCHECK(remote_window);
- DWORD process_id = 0;
- DWORD thread_id = GetWindowThreadProcessId(remote_window, &process_id);
- @@ -42,7 +44,8 @@ NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window) {
- return NOTIFY_FAILED;
-
- // Send the command line to the remote chrome window.
- - // Format is "START\0<<<current directory>>>\0<<<commandline>>>".
- + // Format is
- + // "START\0<current-directory>\0<command-line>\0<additional-data-length>\0<additional-data>".
- std::wstring to_send(L"START\0", 6); // want the NULL in the string.
- base::FilePath cur_dir;
- if (!base::GetCurrentDirectory(&cur_dir))
- @@ -53,6 +56,22 @@ NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window) {
- base::CommandLine::ForCurrentProcess()->GetCommandLineString());
- to_send.append(L"\0", 1); // Null separator.
-
- + size_t additional_data_size = additional_data.size_bytes();
- + if (additional_data_size) {
- + // Send over the size, because the reinterpret cast to wchar_t could
- + // add padding.
- + to_send.append(base::UTF8ToWide(base::NumberToString(additional_data_size)));
- + to_send.append(L"\0", 1); // Null separator.
- +
- + size_t padded_size = additional_data_size / sizeof(wchar_t);
- + if (additional_data_size % sizeof(wchar_t) != 0) {
- + padded_size++;
- + }
- + to_send.append(reinterpret_cast<const wchar_t*>(additional_data.data()),
- + padded_size);
- + to_send.append(L"\0", 1); // Null separator.
- + }
- +
- // Allow the current running browser window to make itself the foreground
- // window (otherwise it will just flash in the taskbar).
- ::AllowSetForegroundWindow(process_id);
- diff --git a/chrome/browser/win/chrome_process_finder.h b/chrome/browser/win/chrome_process_finder.h
- index 5516673cee019f6060077091e59498bf9038cd6e..8edea5079b46c2cba67833114eb9c21d85cfc22d 100644
- --- a/chrome/browser/win/chrome_process_finder.h
- +++ b/chrome/browser/win/chrome_process_finder.h
- @@ -7,6 +7,7 @@
-
- #include <windows.h>
-
- +#include "base/containers/span.h"
- #include "base/time/time.h"
-
- namespace base {
- @@ -27,7 +28,9 @@ HWND FindRunningChromeWindow(const base::FilePath& user_data_dir);
- // Attempts to send the current command line to an already running instance of
- // Chrome via a WM_COPYDATA message.
- // Returns true if a running Chrome is found and successfully notified.
- -NotifyChromeResult AttemptToNotifyRunningChrome(HWND remote_window);
- +NotifyChromeResult AttemptToNotifyRunningChrome(
- + HWND remote_window,
- + const base::span<const uint8_t> additional_data);
-
- // Changes the notification timeout to |new_timeout|, returns the old timeout.
- base::TimeDelta SetNotificationTimeoutForTesting(base::TimeDelta new_timeout);
|