blob: d5ee643a1bdd637f7c920ab0db679ce21e3b717c [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/android/seccomp_support_detector.h"
#include <stdio.h>
#include <sys/utsname.h>
#include "base/metrics/histogram_macros.h"
#include "base/metrics/sparse_histogram.h"
#include "content/public/browser/browser_thread.h"
#if defined(USE_SECCOMP_BPF)
#include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
#endif
using content::BrowserThread;
enum AndroidSeccompStatus {
// DETECTION_FAILED was formerly used when probing for seccomp was done
// out-of-process. There does not appear to be a gain in doing so, as
// explained in the comment in DetectSeccomp(). This enum remains for
// historical reasons.
DETECTION_FAILED_OBSOLETE, // The process crashed during detection.
NOT_SUPPORTED, // Kernel has no seccomp support.
SUPPORTED, // Kernel has seccomp support.
LAST_STATUS
};
// static
void SeccompSupportDetector::StartDetection() {
// This is instantiated here, and then ownership is maintained by the
// Closure objects when the object is being passed between threads. When
// the last Closure runs, it will delete this.
scoped_refptr<SeccompSupportDetector> detector(new SeccompSupportDetector());
BrowserThread::PostBlockingPoolTask(FROM_HERE,
base::Bind(&SeccompSupportDetector::DetectKernelVersion, detector));
BrowserThread::PostBlockingPoolTask(FROM_HERE,
base::Bind(&SeccompSupportDetector::DetectSeccomp, detector));
}
SeccompSupportDetector::SeccompSupportDetector() {
}
SeccompSupportDetector::~SeccompSupportDetector() {
}
void SeccompSupportDetector::DetectKernelVersion() {
DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread());
// This method will report the kernel major and minor versions by
// taking the lower 16 bits of each version number and combining
// the two into a 32-bit number.
utsname uts;
if (uname(&uts) == 0) {
int major, minor;
if (sscanf(uts.release, "%d.%d", &major, &minor) == 2) {
int version = ((major & 0xFFFF) << 16) | (minor & 0xFFFF);
UMA_HISTOGRAM_SPARSE_SLOWLY("Android.KernelVersion", version);
}
}
}
void SeccompSupportDetector::DetectSeccomp() {
DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread());
#if defined(USE_SECCOMP_BPF)
bool prctl_supported = sandbox::SandboxBPF::SupportsSeccompSandbox(
sandbox::SandboxBPF::SeccompLevel::SINGLE_THREADED);
#else
bool prctl_supported = false;
#endif
UMA_HISTOGRAM_ENUMERATION("Android.SeccompStatus.Prctl",
prctl_supported ? SUPPORTED : NOT_SUPPORTED,
LAST_STATUS);
// Probing for the seccomp syscall can provoke kernel panics in certain LGE
// devices. For now, this data will not be collected. In the future, this
// should detect SeccompLevel::MULTI_THREADED. http://crbug.com/478478
}