1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_
6 #define CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_
8 #include "base/compiler_specific.h"
9 #include "content/public/browser/utility_process_host_client.h"
11 // This class is used to report via UMA the Android kernel version and
12 // level of seccomp-bpf support. The kernel version is read from the blocking
13 // thread pool, while seccomp support is tested in a utility process, in case
14 // the probing causes a crash.
15 class SeccompSupportDetector
: public content::UtilityProcessHostClient
{
17 // Starts the detection process. This should be called once per browser
18 // session. This is safe to call from any thread.
19 static void StartDetection();
22 SeccompSupportDetector();
23 ~SeccompSupportDetector() override
;
25 // Called on the blocking thread pool. This reads the utsname and records
26 // the kernel version.
27 void DetectKernelVersion();
29 // Called on the IO thread. This starts a utility process to detect seccomp.
32 // UtilityProcessHostClient:
33 void OnProcessCrashed(int exit_code
) override
;
34 bool OnMessageReceived(const IPC::Message
& message
) override
;
36 // OnDetectPrctl is always received before OnDetectSyscall.
37 void OnDetectPrctl(bool prctl_supported
);
38 void OnDetectSyscall(bool syscall_supported
);
40 // Whether OnDetectPrctl was received.
43 DISALLOW_COPY_AND_ASSIGN(SeccompSupportDetector
);
46 #endif // CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_