mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
cf06b12d8d
This change also includes the content sandboxing code on Windows Nightly by defining MOZ_CONTENT_SANDBOX=1. Whether the content sandbox is disabled, in warn only mode, or enabled is controlled by a new pref: browser.tabs.remote.sandbox=(off/warn/on)
163 lines
4.4 KiB
C++
163 lines
4.4 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*-
|
|
* vim: sw=4 ts=4 et :
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsXPCOM.h"
|
|
#include "nsXULAppAPI.h"
|
|
|
|
// FIXME/cjones testing
|
|
#if !defined(OS_WIN)
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#ifdef XP_WIN
|
|
#include <windows.h>
|
|
// we want a wmain entry point
|
|
// but we don't want its DLL load protection, because we'll handle it here
|
|
#define XRE_DONT_PROTECT_DLL_LOAD
|
|
#include "nsWindowsWMain.cpp"
|
|
#include "nsSetDllDirectory.h"
|
|
#endif
|
|
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
#include "sandbox/chromium/base/basictypes.h"
|
|
#include "sandbox/win/src/sandbox.h"
|
|
#include "sandbox/win/src/sandbox_factory.h"
|
|
#include "mozilla/sandboxTarget.h"
|
|
|
|
#if defined(MOZ_CONTENT_SANDBOX)
|
|
#include "mozilla/warnonlysandbox/wosCallbacks.h"
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
# include <sys/time.h>
|
|
# include <sys/resource.h>
|
|
|
|
# include <binder/ProcessState.h>
|
|
|
|
# ifdef LOGE_IF
|
|
# undef LOGE_IF
|
|
# endif
|
|
|
|
# include <android/log.h>
|
|
# define LOGE_IF(cond, ...) \
|
|
( (CONDITION(cond)) \
|
|
? ((void)__android_log_print(ANDROID_LOG_ERROR, \
|
|
"Gecko:MozillaRntimeMain", __VA_ARGS__)) \
|
|
: (void)0 )
|
|
|
|
#endif
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
#include <binder/ProcessState.h>
|
|
#include "ipc/Nuwa.h"
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
static void
|
|
InitializeBinder(void *aDummy) {
|
|
// Change thread priority to 0 only during calling ProcessState::self().
|
|
// The priority is registered to binder driver and used for default Binder
|
|
// Thread's priority.
|
|
// To change the process's priority to small value need's root permission.
|
|
int curPrio = getpriority(PRIO_PROCESS, 0);
|
|
int err = setpriority(PRIO_PROCESS, 0, 0);
|
|
MOZ_ASSERT(!err);
|
|
LOGE_IF(err, "setpriority failed. Current process needs root permission.");
|
|
android::ProcessState::self()->startThreadPool();
|
|
setpriority(PRIO_PROCESS, 0, curPrio);
|
|
}
|
|
#endif
|
|
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
static bool gIsSandboxEnabled = false;
|
|
void StartSandboxCallback()
|
|
{
|
|
if (gIsSandboxEnabled) {
|
|
sandbox::TargetServices* target_service =
|
|
sandbox::SandboxFactory::GetTargetServices();
|
|
target_service->LowerToken();
|
|
}
|
|
}
|
|
#endif
|
|
|
|
int
|
|
content_process_main(int argc, char* argv[])
|
|
{
|
|
// Check for the absolute minimum number of args we need to move
|
|
// forward here. We expect the last arg to be the child process type.
|
|
if (argc < 1) {
|
|
return 3;
|
|
}
|
|
XRE_SetProcessType(argv[--argc]);
|
|
|
|
bool isNuwa = false;
|
|
for (int i = 1; i < argc; i++) {
|
|
isNuwa |= strcmp(argv[i], "-nuwa") == 0;
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
gIsSandboxEnabled |= strcmp(argv[i], "-sandbox") == 0;
|
|
#endif
|
|
}
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
if (isNuwa) {
|
|
PrepareNuwaProcess();
|
|
}
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
// This creates a ThreadPool for binder ipc. A ThreadPool is necessary to
|
|
// receive binder calls, though not necessary to send binder calls.
|
|
// ProcessState::Self() also needs to be called once on the main thread to
|
|
// register the main thread with the binder driver.
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
if (!isNuwa) {
|
|
InitializeBinder(nullptr);
|
|
} else {
|
|
NuwaAddFinalConstructor(&InitializeBinder, nullptr);
|
|
}
|
|
#else
|
|
InitializeBinder(nullptr);
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef XP_WIN
|
|
// For plugins, this is done in PluginProcessChild::Init, as we need to
|
|
// avoid it for unsupported plugins. See PluginProcessChild::Init for
|
|
// the details.
|
|
if (XRE_GetProcessType() != GeckoProcessType_Plugin) {
|
|
mozilla::SanitizeEnvironmentVariables();
|
|
SetDllDirectory(L"");
|
|
}
|
|
|
|
#ifdef MOZ_SANDBOX
|
|
if (gIsSandboxEnabled) {
|
|
sandbox::TargetServices* target_service =
|
|
sandbox::SandboxFactory::GetTargetServices();
|
|
if (!target_service) {
|
|
return 1;
|
|
}
|
|
|
|
sandbox::ResultCode result = target_service->Init();
|
|
if (result != sandbox::SBOX_ALL_OK) {
|
|
return 2;
|
|
}
|
|
mozilla::SandboxTarget::Instance()->SetStartSandboxCallback(StartSandboxCallback);
|
|
|
|
#if defined(MOZ_CONTENT_SANDBOX)
|
|
mozilla::warnonlysandbox::PrepareForInit();
|
|
#endif
|
|
}
|
|
#endif
|
|
#endif
|
|
|
|
nsresult rv = XRE_InitChildProcess(argc, argv);
|
|
NS_ENSURE_SUCCESS(rv, 1);
|
|
|
|
return 0;
|
|
}
|