mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-25 13:51:41 +00:00
e6bdfd5594
This also removes a rule that was added for sandboxing the Java plugin, which we never did and we now only allow Flash anyway. MozReview-Commit-ID: Jn6pCkLoGNM --HG-- extra : source : 431267ab28deabef6ed7c791d8dff79e3fe590c1
231 lines
7.4 KiB
C++
231 lines
7.4 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef __IPC_GLUE_GECKOCHILDPROCESSHOST_H__
|
|
#define __IPC_GLUE_GECKOCHILDPROCESSHOST_H__
|
|
|
|
#include "base/file_path.h"
|
|
#include "base/process_util.h"
|
|
#include "base/waitable_event.h"
|
|
#include "chrome/common/child_process_host.h"
|
|
|
|
#include "mozilla/DebugOnly.h"
|
|
#include "mozilla/ipc/FileDescriptor.h"
|
|
#include "mozilla/Monitor.h"
|
|
#include "mozilla/StaticPtr.h"
|
|
|
|
#include "nsCOMPtr.h"
|
|
#include "nsXULAppAPI.h" // for GeckoProcessType
|
|
#include "nsString.h"
|
|
|
|
#if defined(XP_WIN) && defined(MOZ_SANDBOX)
|
|
#include "sandboxBroker.h"
|
|
#endif
|
|
|
|
namespace mozilla {
|
|
namespace ipc {
|
|
|
|
class GeckoChildProcessHost : public ChildProcessHost
|
|
{
|
|
protected:
|
|
typedef mozilla::Monitor Monitor;
|
|
typedef std::vector<std::string> StringVector;
|
|
|
|
public:
|
|
typedef base::ChildPrivileges ChildPrivileges;
|
|
typedef base::ProcessHandle ProcessHandle;
|
|
|
|
static ChildPrivileges DefaultChildPrivileges();
|
|
|
|
explicit GeckoChildProcessHost(GeckoProcessType aProcessType,
|
|
ChildPrivileges aPrivileges=base::PRIVILEGES_DEFAULT);
|
|
|
|
~GeckoChildProcessHost();
|
|
|
|
static nsresult GetArchitecturesForBinary(const char *path, uint32_t *result);
|
|
|
|
static uint32_t GetSupportedArchitecturesForProcessType(GeckoProcessType type);
|
|
|
|
static uint32_t GetUniqueID();
|
|
|
|
// Block until the IPC channel for our subprocess is initialized,
|
|
// but no longer. The child process may or may not have been
|
|
// created when this method returns.
|
|
bool AsyncLaunch(StringVector aExtraOpts=StringVector(),
|
|
base::ProcessArchitecture arch=base::GetCurrentProcessArchitecture());
|
|
|
|
virtual bool WaitUntilConnected(int32_t aTimeoutMs = 0);
|
|
|
|
// Block until the IPC channel for our subprocess is initialized and
|
|
// the OS process is created. The subprocess may or may not have
|
|
// connected back to us when this method returns.
|
|
//
|
|
// NB: on POSIX, this method is relatively cheap, and doesn't
|
|
// require disk IO. On win32 however, it requires at least the
|
|
// analogue of stat(). This difference induces a semantic
|
|
// difference in this method: on POSIX, when we return, we know the
|
|
// subprocess has been created, but we don't know whether its
|
|
// executable image can be loaded. On win32, we do know that when
|
|
// we return. But we don't know if dynamic linking succeeded on
|
|
// either platform.
|
|
bool LaunchAndWaitForProcessHandle(StringVector aExtraOpts=StringVector());
|
|
|
|
// Block until the child process has been created and it connects to
|
|
// the IPC channel, meaning it's fully initialized. (Or until an
|
|
// error occurs.)
|
|
bool SyncLaunch(StringVector aExtraOpts=StringVector(),
|
|
int32_t timeoutMs=0,
|
|
base::ProcessArchitecture arch=base::GetCurrentProcessArchitecture());
|
|
|
|
virtual bool PerformAsyncLaunch(StringVector aExtraOpts=StringVector(),
|
|
base::ProcessArchitecture aArch=base::GetCurrentProcessArchitecture());
|
|
|
|
virtual void OnChannelConnected(int32_t peer_pid);
|
|
virtual void OnMessageReceived(IPC::Message&& aMsg);
|
|
virtual void OnChannelError();
|
|
virtual void GetQueuedMessages(std::queue<IPC::Message>& queue);
|
|
|
|
virtual void InitializeChannel();
|
|
|
|
virtual bool CanShutdown() { return true; }
|
|
|
|
IPC::Channel* GetChannel() {
|
|
return channelp();
|
|
}
|
|
|
|
// Returns a "borrowed" handle to the child process - the handle returned
|
|
// by this function must not be closed by the caller.
|
|
ProcessHandle GetChildProcessHandle() {
|
|
return mChildProcessHandle;
|
|
}
|
|
|
|
GeckoProcessType GetProcessType() {
|
|
return mProcessType;
|
|
}
|
|
|
|
#ifdef XP_MACOSX
|
|
task_t GetChildTask() {
|
|
return mChildTask;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* Must run on the IO thread. Cause the OS process to exit and
|
|
* ensure its OS resources are cleaned up.
|
|
*/
|
|
void Join();
|
|
|
|
// For bug 943174: Skip the EnsureProcessTerminated call in the destructor.
|
|
void SetAlreadyDead();
|
|
|
|
static void EnableSameExecutableForContentProc() { sRunSelfAsContentProc = true; }
|
|
|
|
protected:
|
|
GeckoProcessType mProcessType;
|
|
ChildPrivileges mPrivileges;
|
|
Monitor mMonitor;
|
|
FilePath mProcessPath;
|
|
|
|
// This value must be accessed while holding mMonitor.
|
|
enum {
|
|
// This object has been constructed, but the OS process has not
|
|
// yet.
|
|
CREATING_CHANNEL = 0,
|
|
// The IPC channel for our subprocess has been created, but the OS
|
|
// process has still not been created.
|
|
CHANNEL_INITIALIZED,
|
|
// The OS process has been created, but it hasn't yet connected to
|
|
// our IPC channel.
|
|
PROCESS_CREATED,
|
|
// The process is launched and connected to our IPC channel. All
|
|
// is well.
|
|
PROCESS_CONNECTED,
|
|
PROCESS_ERROR
|
|
} mProcessState;
|
|
|
|
static int32_t mChildCounter;
|
|
|
|
void PrepareLaunch();
|
|
|
|
#ifdef XP_WIN
|
|
void InitWindowsGroupID();
|
|
nsString mGroupId;
|
|
|
|
#ifdef MOZ_SANDBOX
|
|
SandboxBroker mSandboxBroker;
|
|
std::vector<std::wstring> mAllowedFilesRead;
|
|
bool mEnableSandboxLogging;
|
|
int32_t mSandboxLevel;
|
|
#endif
|
|
#endif // XP_WIN
|
|
|
|
#if defined(OS_POSIX)
|
|
base::file_handle_mapping_vector mFileMap;
|
|
#endif
|
|
|
|
ProcessHandle mChildProcessHandle;
|
|
#if defined(OS_MACOSX)
|
|
task_t mChildTask;
|
|
#endif
|
|
|
|
bool OpenPrivilegedHandle(base::ProcessId aPid);
|
|
|
|
private:
|
|
DISALLOW_EVIL_CONSTRUCTORS(GeckoChildProcessHost);
|
|
|
|
// Does the actual work for AsyncLaunch, on the IO thread.
|
|
bool PerformAsyncLaunchInternal(std::vector<std::string>& aExtraOpts,
|
|
base::ProcessArchitecture arch);
|
|
|
|
bool RunPerformAsyncLaunch(StringVector aExtraOpts=StringVector(),
|
|
base::ProcessArchitecture aArch=base::GetCurrentProcessArchitecture());
|
|
|
|
enum class BinaryPathType {
|
|
Self,
|
|
PluginContainer
|
|
};
|
|
|
|
static BinaryPathType GetPathToBinary(FilePath& exePath, GeckoProcessType processType);
|
|
|
|
// The buffer is passed to preserve its lifetime until we are done
|
|
// with launching the sub-process.
|
|
void SetChildLogName(const char* varName, const char* origLogName,
|
|
nsACString &buffer);
|
|
|
|
// In between launching the subprocess and handing off its IPC
|
|
// channel, there's a small window of time in which *we* might still
|
|
// be the channel listener, and receive messages. That's bad
|
|
// because we have no idea what to do with those messages. So queue
|
|
// them here until we hand off the eventual listener.
|
|
//
|
|
// FIXME/cjones: this strongly indicates bad design. Shame on us.
|
|
std::queue<IPC::Message> mQueue;
|
|
|
|
// Remember original env values so we can restore it (there is no other
|
|
// simple way how to change environment of a child process than to modify
|
|
// the current environment).
|
|
nsCString mRestoreOrigNSPRLogName;
|
|
nsCString mRestoreOrigMozLogName;
|
|
nsCString mRestoreOrigRustLog;
|
|
|
|
static uint32_t sNextUniqueID;
|
|
|
|
static bool sRunSelfAsContentProc;
|
|
|
|
#if defined(MOZ_WIDGET_ANDROID)
|
|
void LaunchAndroidService(const char* type,
|
|
const std::vector<std::string>& argv,
|
|
const base::file_handle_mapping_vector& fds_to_remap,
|
|
ProcessHandle* process_handle);
|
|
#endif // defined(MOZ_WIDGET_ANDROID)
|
|
|
|
};
|
|
|
|
} /* namespace ipc */
|
|
} /* namespace mozilla */
|
|
|
|
#endif /* __IPC_GLUE_GECKOCHILDPROCESSHOST_H__ */
|