mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-24 13:21:05 +00:00
32cb9ee32d
This means that B2G plugin-container must (dynamically) link against libmozsandbox in order to call into it before initializing Binder. (Desktop Linux plugin-container already contains the sandbox code.)
241 lines
6.9 KiB
C++
241 lines
6.9 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*-
|
|
* vim: sw=4 ts=4 et :
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsXPCOM.h"
|
|
#include "nsXULAppAPI.h"
|
|
#include "nsAutoPtr.h"
|
|
|
|
// FIXME/cjones testing
|
|
#if !defined(OS_WIN)
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#ifdef XP_WIN
|
|
#include <windows.h>
|
|
// we want a wmain entry point
|
|
// but we don't want its DLL load protection, because we'll handle it here
|
|
#define XRE_DONT_PROTECT_DLL_LOAD
|
|
#include "nsWindowsWMain.cpp"
|
|
#include "nsSetDllDirectory.h"
|
|
#endif
|
|
|
|
#include "GMPLoader.h"
|
|
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
#include "mozilla/sandboxTarget.h"
|
|
#include "mozilla/sandboxing/loggingCallbacks.h"
|
|
#include "sandbox/win/src/sandbox_factory.h"
|
|
#endif
|
|
|
|
#if defined(XP_LINUX) && defined(MOZ_GMP_SANDBOX)
|
|
#include "mozilla/Sandbox.h"
|
|
#include "mozilla/SandboxInfo.h"
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
# include <sys/time.h>
|
|
# include <sys/resource.h>
|
|
|
|
# include <binder/ProcessState.h>
|
|
|
|
# ifdef LOGE_IF
|
|
# undef LOGE_IF
|
|
# endif
|
|
|
|
# include <android/log.h>
|
|
# define LOGE_IF(cond, ...) \
|
|
( (CONDITION(cond)) \
|
|
? ((void)__android_log_print(ANDROID_LOG_ERROR, \
|
|
"Gecko:MozillaRntimeMain", __VA_ARGS__)) \
|
|
: (void)0 )
|
|
|
|
# ifdef MOZ_CONTENT_SANDBOX
|
|
# include "mozilla/Sandbox.h"
|
|
# endif
|
|
|
|
#endif // MOZ_WIDGET_GONK
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
#include <binder/ProcessState.h>
|
|
#include "ipc/Nuwa.h"
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
static void
|
|
InitializeBinder(void *aDummy) {
|
|
// Change thread priority to 0 only during calling ProcessState::self().
|
|
// The priority is registered to binder driver and used for default Binder
|
|
// Thread's priority.
|
|
// To change the process's priority to small value need's root permission.
|
|
int curPrio = getpriority(PRIO_PROCESS, 0);
|
|
int err = setpriority(PRIO_PROCESS, 0, 0);
|
|
MOZ_ASSERT(!err);
|
|
LOGE_IF(err, "setpriority failed. Current process needs root permission.");
|
|
android::ProcessState::self()->startThreadPool();
|
|
setpriority(PRIO_PROCESS, 0, curPrio);
|
|
}
|
|
#endif
|
|
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
static bool gIsSandboxEnabled = false;
|
|
|
|
class WinSandboxStarter : public mozilla::gmp::SandboxStarter {
|
|
public:
|
|
virtual bool Start(const char *aLibPath) override {
|
|
if (gIsSandboxEnabled) {
|
|
sandbox::SandboxFactory::GetTargetServices()->LowerToken();
|
|
}
|
|
return true;
|
|
}
|
|
};
|
|
#endif
|
|
|
|
#if defined(XP_LINUX) && defined(MOZ_GMP_SANDBOX)
|
|
class LinuxSandboxStarter : public mozilla::gmp::SandboxStarter {
|
|
LinuxSandboxStarter() { }
|
|
public:
|
|
static SandboxStarter* Make() {
|
|
if (mozilla::SandboxInfo::Get().CanSandboxMedia()) {
|
|
return new LinuxSandboxStarter();
|
|
} else {
|
|
// Sandboxing isn't possible, but the parent has already
|
|
// checked that this plugin doesn't require it. (Bug 1074561)
|
|
return nullptr;
|
|
}
|
|
}
|
|
virtual bool Start(const char *aLibPath) override {
|
|
mozilla::SetMediaPluginSandbox(aLibPath);
|
|
return true;
|
|
}
|
|
};
|
|
#endif
|
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_GMP_SANDBOX)
|
|
class MacSandboxStarter : public mozilla::gmp::SandboxStarter {
|
|
public:
|
|
virtual bool Start(const char *aLibPath) override {
|
|
std::string err;
|
|
bool rv = mozilla::StartMacSandbox(mInfo, err);
|
|
if (!rv) {
|
|
fprintf(stderr, "sandbox_init() failed! Error \"%s\"\n", err.c_str());
|
|
}
|
|
return rv;
|
|
}
|
|
virtual void SetSandboxInfo(MacSandboxInfo* aSandboxInfo) override {
|
|
mInfo = *aSandboxInfo;
|
|
}
|
|
private:
|
|
MacSandboxInfo mInfo;
|
|
};
|
|
#endif
|
|
|
|
mozilla::gmp::SandboxStarter*
|
|
MakeSandboxStarter()
|
|
{
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
return new WinSandboxStarter();
|
|
#elif defined(XP_LINUX) && defined(MOZ_GMP_SANDBOX)
|
|
return LinuxSandboxStarter::Make();
|
|
#elif defined(XP_MACOSX) && defined(MOZ_GMP_SANDBOX)
|
|
return new MacSandboxStarter();
|
|
#else
|
|
return nullptr;
|
|
#endif
|
|
}
|
|
|
|
int
|
|
content_process_main(int argc, char* argv[])
|
|
{
|
|
// Check for the absolute minimum number of args we need to move
|
|
// forward here. We expect the last arg to be the child process type.
|
|
if (argc < 1) {
|
|
return 3;
|
|
}
|
|
XRE_SetProcessType(argv[--argc]);
|
|
|
|
bool isNuwa = false;
|
|
for (int i = 1; i < argc; i++) {
|
|
isNuwa |= strcmp(argv[i], "-nuwa") == 0;
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
gIsSandboxEnabled |= strcmp(argv[i], "-sandbox") == 0;
|
|
#endif
|
|
}
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
if (isNuwa) {
|
|
PrepareNuwaProcess();
|
|
}
|
|
#endif
|
|
|
|
#if defined(XP_LINUX) && defined(MOZ_SANDBOX)
|
|
// This has to happen while we're still single-threaded, and on
|
|
// B2G that means before the Android Binder library is
|
|
// initialized. Additional special handling is needed for Nuwa:
|
|
// the Nuwa process itself needs to be unsandboxed, and the same
|
|
// single-threadedness condition applies to its children; see also
|
|
// AfterNuwaFork().
|
|
mozilla::SandboxEarlyInit(XRE_GetProcessType(), isNuwa);
|
|
#endif
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
// This creates a ThreadPool for binder ipc. A ThreadPool is necessary to
|
|
// receive binder calls, though not necessary to send binder calls.
|
|
// ProcessState::Self() also needs to be called once on the main thread to
|
|
// register the main thread with the binder driver.
|
|
|
|
#ifdef MOZ_NUWA_PROCESS
|
|
if (!isNuwa) {
|
|
InitializeBinder(nullptr);
|
|
} else {
|
|
NuwaAddFinalConstructor(&InitializeBinder, nullptr);
|
|
}
|
|
#else
|
|
InitializeBinder(nullptr);
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef XP_WIN
|
|
// For plugins, this is done in PluginProcessChild::Init, as we need to
|
|
// avoid it for unsupported plugins. See PluginProcessChild::Init for
|
|
// the details.
|
|
if (XRE_GetProcessType() != GeckoProcessType_Plugin) {
|
|
mozilla::SanitizeEnvironmentVariables();
|
|
SetDllDirectory(L"");
|
|
}
|
|
|
|
#ifdef MOZ_SANDBOX
|
|
if (gIsSandboxEnabled) {
|
|
sandbox::TargetServices* target_service =
|
|
sandbox::SandboxFactory::GetTargetServices();
|
|
if (!target_service) {
|
|
return 1;
|
|
}
|
|
|
|
sandbox::ResultCode result =
|
|
mozilla::SandboxTarget::Instance()->InitTargetServices(target_service);
|
|
if (result != sandbox::SBOX_ALL_OK) {
|
|
return 2;
|
|
}
|
|
|
|
mozilla::sandboxing::PrepareForLogging();
|
|
}
|
|
#endif
|
|
#endif
|
|
nsAutoPtr<mozilla::gmp::GMPLoader> loader;
|
|
#if !defined(MOZ_WIDGET_ANDROID) && !defined(MOZ_WIDGET_GONK)
|
|
// On desktop, the GMPLoader lives in plugin-container, so that its
|
|
// code can be covered by an EME/GMP vendor's voucher.
|
|
nsAutoPtr<mozilla::gmp::SandboxStarter> starter(MakeSandboxStarter());
|
|
if (XRE_GetProcessType() == GeckoProcessType_GMPlugin) {
|
|
loader = mozilla::gmp::CreateGMPLoader(starter);
|
|
}
|
|
#endif
|
|
nsresult rv = XRE_InitChildProcess(argc, argv, loader);
|
|
NS_ENSURE_SUCCESS(rv, 1);
|
|
|
|
return 0;
|
|
}
|