Commit c393a5b4 authored by caitkp's avatar caitkp Committed by Commit bot

Reland Issue 1132473003: Cache IsNonBrowserProcess

so we only take a loader-lock the first time.

BUG=485656, 477137

Review URL: https://codereview.chromium.org/1144433004

Cr-Commit-Position: refs/heads/master@{#329911}
parent 6a33233b
...@@ -5,11 +5,14 @@ ...@@ -5,11 +5,14 @@
#include <windows.h> #include <windows.h>
#include "chrome_elf/blacklist/blacklist.h" #include "chrome_elf/blacklist/blacklist.h"
#include "chrome_elf/chrome_elf_util.h"
extern "C" void InitBlacklistTestDll() {} extern "C" void InitBlacklistTestDll() {
}
BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) {
if (reason == DLL_PROCESS_ATTACH) { if (reason == DLL_PROCESS_ATTACH) {
InitializeProcessType();
blacklist::Initialize(true); // force always on, no beacon blacklist::Initialize(true); // force always on, no beacon
} }
......
...@@ -8,6 +8,7 @@ ...@@ -8,6 +8,7 @@
#include "chrome_elf/blacklist/blacklist.h" #include "chrome_elf/blacklist/blacklist.h"
#include "chrome_elf/breakpad.h" #include "chrome_elf/breakpad.h"
#include "chrome_elf/chrome_elf_util.h"
#include "chrome_elf/ntdll_cache.h" #include "chrome_elf/ntdll_cache.h"
void SignalChromeElf() { void SignalChromeElf() {
...@@ -16,6 +17,7 @@ void SignalChromeElf() { ...@@ -16,6 +17,7 @@ void SignalChromeElf() {
BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) { BOOL APIENTRY DllMain(HMODULE module, DWORD reason, LPVOID reserved) {
if (reason == DLL_PROCESS_ATTACH) { if (reason == DLL_PROCESS_ATTACH) {
InitializeProcessType();
InitializeCrashReporting(); InitializeCrashReporting();
__try { __try {
......
...@@ -4,11 +4,14 @@ ...@@ -4,11 +4,14 @@
#include "chrome_elf/chrome_elf_util.h" #include "chrome_elf/chrome_elf_util.h"
#include <assert.h>
#include <windows.h> #include <windows.h>
#include "base/macros.h" #include "base/macros.h"
#include "base/strings/string16.h" #include "base/strings/string16.h"
ProcessType g_process_type = ProcessType::UNINITIALIZED;
namespace { namespace {
const wchar_t kRegPathClientState[] = L"Software\\Google\\Update\\ClientState"; const wchar_t kRegPathClientState[] = L"Software\\Google\\Update\\ClientState";
...@@ -192,18 +195,29 @@ bool ReportingIsEnforcedByPolicy(bool* breakpad_enabled) { ...@@ -192,18 +195,29 @@ bool ReportingIsEnforcedByPolicy(bool* breakpad_enabled) {
return false; return false;
} }
bool IsNonBrowserProcess() { void InitializeProcessType() {
assert(g_process_type == ProcessType::UNINITIALIZED);
typedef bool (*IsSandboxedProcessFunc)(); typedef bool (*IsSandboxedProcessFunc)();
IsSandboxedProcessFunc is_sandboxed_process_func = IsSandboxedProcessFunc is_sandboxed_process_func =
reinterpret_cast<IsSandboxedProcessFunc>( reinterpret_cast<IsSandboxedProcessFunc>(
GetProcAddress(GetModuleHandle(NULL), "IsSandboxedProcess")); GetProcAddress(GetModuleHandle(NULL), "IsSandboxedProcess"));
bool is_sandboxed_process = if (is_sandboxed_process_func && is_sandboxed_process_func()) {
is_sandboxed_process_func && is_sandboxed_process_func(); g_process_type = ProcessType::NON_BROWSER_PROCESS;
return;
}
// TODO(robertshield): Drop the command line check when we drop support for // TODO(robertshield): Drop the command line check when we drop support for
// enabling chrome_elf in unsandboxed processes. // enabling chrome_elf in unsandboxed processes.
wchar_t* command_line = GetCommandLine(); const wchar_t* command_line = GetCommandLine();
bool has_process_type_flag = command_line && wcsstr(command_line, L"--type"); if (command_line && wcsstr(command_line, L"--type")) {
g_process_type = ProcessType::NON_BROWSER_PROCESS;
return;
}
return (has_process_type_flag || is_sandboxed_process); g_process_type = ProcessType::BROWSER_PROCESS;
}
bool IsNonBrowserProcess() {
assert(g_process_type != ProcessType::UNINITIALIZED);
return g_process_type == ProcessType::NON_BROWSER_PROCESS;
} }
...@@ -7,6 +7,12 @@ ...@@ -7,6 +7,12 @@
#include "base/strings/string16.h" #include "base/strings/string16.h"
enum class ProcessType {
UNINITIALIZED,
NON_BROWSER_PROCESS,
BROWSER_PROCESS,
};
// Returns true if |exe_path| points to a Chrome installed in an SxS // Returns true if |exe_path| points to a Chrome installed in an SxS
// installation. // installation.
bool IsCanary(const wchar_t* exe_path); bool IsCanary(const wchar_t* exe_path);
...@@ -24,8 +30,15 @@ bool AreUsageStatsEnabled(const wchar_t* exe_path); ...@@ -24,8 +30,15 @@ bool AreUsageStatsEnabled(const wchar_t* exe_path);
// if stats collecting is permitted by this policy and false if not. // if stats collecting is permitted by this policy and false if not.
bool ReportingIsEnforcedByPolicy(bool* breakpad_enabled); bool ReportingIsEnforcedByPolicy(bool* breakpad_enabled);
// Initializes |g_process_type| which stores whether or not the current process
// is the main browser process.
void InitializeProcessType();
// Returns true if invoked in a Chrome process other than the main browser // Returns true if invoked in a Chrome process other than the main browser
// process. False otherwise. // process. False otherwise.
bool IsNonBrowserProcess(); bool IsNonBrowserProcess();
// Caches the |ProcessType| of the current process.
extern ProcessType g_process_type;
#endif // CHROME_ELF_CHROME_ELF_UTIL_H_ #endif // CHROME_ELF_CHROME_ELF_UTIL_H_
...@@ -48,6 +48,12 @@ TEST(ChromeElfUtilTest, SystemInstallTest) { ...@@ -48,6 +48,12 @@ TEST(ChromeElfUtilTest, SystemInstallTest) {
EXPECT_FALSE(IsSystemInstall(kChromeUserExePath)); EXPECT_FALSE(IsSystemInstall(kChromeUserExePath));
} }
TEST(ChromeElfUtilTest, BrowserProcessTest) {
EXPECT_EQ(ProcessType::UNINITIALIZED, g_process_type);
InitializeProcessType();
EXPECT_FALSE(IsNonBrowserProcess());
}
// Parameterized test with paramters: // Parameterized test with paramters:
// 1: product: "canary" or "google" // 1: product: "canary" or "google"
// 2: install level: "user" or "system" // 2: install level: "user" or "system"
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment