Home | History | Annotate | Download | only in browser
      1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include <errno.h>
      6 #include <fcntl.h>
      7 #include <sys/file.h>
      8 
      9 #include "chrome/browser/process_singleton.h"
     10 
     11 #include "base/eintr_wrapper.h"
     12 #include "base/file_util.h"
     13 #include "base/metrics/histogram.h"
     14 #include "chrome/common/chrome_constants.h"
     15 
     16 namespace {
     17 
     18 // From "man 2 intro", the largest errno is |EOPNOTSUPP|, which is
     19 // |102|.  Since the histogram memory usage is proportional to this
     20 // number, using the |102| directly rather than the macro.
     21 const int kMaxErrno = 102;
     22 
     23 }  // namespace
     24 
     25 // This class is used to funnel messages to a single instance of the browser
     26 // process. This is needed for several reasons on other platforms.
     27 //
     28 // On Windows, when the user re-opens the application from the shell (e.g. an
     29 // explicit double-click, a shortcut that opens a webpage, etc.) we need to send
     30 // the message to the currently-existing copy of the browser.
     31 //
     32 // On Linux, opening a URL is done by creating an instance of the web browser
     33 // process and passing it the URL to go to on its commandline.
     34 //
     35 // Neither of those cases apply on the Mac. Launch Services ensures that there
     36 // is only one instance of the process, and we get URLs to open via AppleEvents
     37 // and, once again, the Launch Services system. We have no need to manage this
     38 // ourselves.  An exclusive lock is used to flush out anyone making incorrect
     39 // assumptions.
     40 
     41 ProcessSingleton::ProcessSingleton(const FilePath& user_data_dir)
     42     : locked_(false),
     43       foreground_window_(NULL),
     44       lock_path_(user_data_dir.Append(chrome::kSingletonLockFilename)),
     45       lock_fd_(-1) {
     46 }
     47 
     48 ProcessSingleton::~ProcessSingleton() {
     49   // Make sure the lock is released.  Process death will also release
     50   // it, even if this is not called.
     51   Cleanup();
     52 }
     53 
     54 ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcess() {
     55   // This space intentionally left blank.
     56   return PROCESS_NONE;
     57 }
     58 
     59 ProcessSingleton::NotifyResult ProcessSingleton::NotifyOtherProcessOrCreate() {
     60   // Windows tries NotifyOtherProcess() first.
     61   return Create() ? PROCESS_NONE : PROFILE_IN_USE;
     62 }
     63 
     64 // Attempt to acquire an exclusive lock on an empty file in the
     65 // profile directory.  Returns |true| if it gets the lock.  Returns
     66 // |false| if the lock is held, or if there is an error.
     67 // TODO(shess): Rather than logging failures, popup an alert.  Punting
     68 // that for now because it would require confidence that this code is
     69 // never called in a situation where an alert wouldn't work.
     70 // http://crbug.com/59061
     71 bool ProcessSingleton::Create() {
     72   DCHECK_EQ(-1, lock_fd_) << "lock_path_ is already open.";
     73 
     74   lock_fd_ = HANDLE_EINTR(open(lock_path_.value().c_str(),
     75                                O_RDONLY | O_CREAT, 0644));
     76   if (lock_fd_ == -1) {
     77     const int capture_errno = errno;
     78     DPCHECK(lock_fd_ != -1) << "Unexpected failure opening profile lockfile";
     79     UMA_HISTOGRAM_ENUMERATION("ProcessSingleton.OpenError",
     80                               capture_errno, kMaxErrno);
     81     return false;
     82   }
     83 
     84   // Acquire an exclusive lock in non-blocking fashion.  If the lock
     85   // is already held, this will return |EWOULDBLOCK|.
     86   int rc = HANDLE_EINTR(flock(lock_fd_, LOCK_EX|LOCK_NB));
     87   if (rc == -1) {
     88     const int capture_errno = errno;
     89     DPCHECK(errno == EWOULDBLOCK)
     90         << "Unexpected failure locking profile lockfile";
     91 
     92     Cleanup();
     93 
     94     // Other errors indicate something crazy is happening.
     95     if (capture_errno != EWOULDBLOCK) {
     96       UMA_HISTOGRAM_ENUMERATION("ProcessSingleton.LockError",
     97                                 capture_errno, kMaxErrno);
     98       return false;
     99     }
    100 
    101     // The file is open by another process and locked.
    102     LOG(ERROR) << "Unable to obtain profile lock.";
    103     return false;
    104   }
    105 
    106   return true;
    107 }
    108 
    109 void ProcessSingleton::Cleanup() {
    110   // Closing the file also releases the lock.
    111   if (lock_fd_ != -1) {
    112     int rc = HANDLE_EINTR(close(lock_fd_));
    113     DPCHECK(!rc) << "Closing lock_fd_:";
    114   }
    115   lock_fd_ = -1;
    116 }
    117