Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(256)

Unified Diff: chrome/browser/android/seccomp_support_detector.h

Issue 1018953004: Add SeccompSupportDetector for Android. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: DCHECK Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/android/seccomp_support_detector.h
diff --git a/chrome/browser/android/seccomp_support_detector.h b/chrome/browser/android/seccomp_support_detector.h
new file mode 100644
index 0000000000000000000000000000000000000000..b363da30f3b3f7108c46b1352f6e979283ec6f1d
--- /dev/null
+++ b/chrome/browser/android/seccomp_support_detector.h
@@ -0,0 +1,46 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_
+#define CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_
+
+#include "base/compiler_specific.h"
+#include "content/public/browser/utility_process_host_client.h"
+
+// This class is used to report via UMA the Android kernel version and
+// level of seccomp-bpf support. The kernel version is read from the FILE
+// thread, while seccomp support is tested in a utility process, in case
+// the probing causes a crash.
+class SeccompSupportDetector : public content::UtilityProcessHostClient {
+ public:
+ // Starts the detection process. This should be called once per browser
+ // session. This is safe to call from any thread.
+ static void StartDetection();
+
+ private:
+ SeccompSupportDetector();
+ ~SeccompSupportDetector() override;
+
+ // Called on the FILE thread. This reads the utsname and records the kernel
+ // version.
+ void DetectKernelVersion();
+
+ // Called on the IO thread. This starts a utility process to detect seccomp.
+ void DetectSeccomp();
+
+ // UtilityProcessHostClient:
+ void OnProcessCrashed(int exit_code) override;
+ bool OnMessageReceived(const IPC::Message& message) override;
+
+ // OnDetectPrctl is always received before OnDetectSyscall.
+ void OnDetectPrctl(bool prctl_supported);
+ void OnDetectSyscall(bool syscall_supported);
+
+ // Whether OnDetectPrctl was received.
+ bool prctl_detected_;
+
+ DISALLOW_COPY_AND_ASSIGN(SeccompSupportDetector);
+};
+
+#endif // CHROME_BROWSER_ANDROID_SECCOMP_SUPPORT_DETECTOR_H_
« no previous file with comments | « no previous file | chrome/browser/android/seccomp_support_detector.cc » ('j') | chrome/browser/android/seccomp_support_detector.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698