diff options
author | Matt A. Tobin <email@mattatobin.com> | 2018-02-02 05:06:10 -0500 |
---|---|---|
committer | Matt A. Tobin <email@mattatobin.com> | 2018-02-02 05:06:10 -0500 |
commit | 6d614170cbfa958564eb5f824234ad5a9e484344 (patch) | |
tree | 3e1eb384382f30987cb2e64bd654afa8b74fd06b /application/basilisk/app/nsBrowserApp.cpp | |
parent | 2a6b605d64b19411a300efdbbd7f78c349f90206 (diff) | |
download | UXP-6d614170cbfa958564eb5f824234ad5a9e484344.tar UXP-6d614170cbfa958564eb5f824234ad5a9e484344.tar.gz UXP-6d614170cbfa958564eb5f824234ad5a9e484344.tar.lz UXP-6d614170cbfa958564eb5f824234ad5a9e484344.tar.xz UXP-6d614170cbfa958564eb5f824234ad5a9e484344.zip |
Revert "Add Basilisk"
This reverts commit e72ef92b5bdc43cd2584198e2e54e951b70299e8.
Diffstat (limited to 'application/basilisk/app/nsBrowserApp.cpp')
-rw-r--r-- | application/basilisk/app/nsBrowserApp.cpp | 321 |
1 files changed, 0 insertions, 321 deletions
diff --git a/application/basilisk/app/nsBrowserApp.cpp b/application/basilisk/app/nsBrowserApp.cpp deleted file mode 100644 index fc7876209..000000000 --- a/application/basilisk/app/nsBrowserApp.cpp +++ /dev/null @@ -1,321 +0,0 @@ -/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ -/* This Source Code Form is subject to the terms of the Mozilla Public - * License, v. 2.0. If a copy of the MPL was not distributed with this - * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ - -#include "nsXULAppAPI.h" -#include "mozilla/XREAppData.h" -#include "application.ini.h" -#include "mozilla/Bootstrap.h" -#if defined(XP_WIN) -#include <windows.h> -#include <stdlib.h> -#elif defined(XP_UNIX) -#include <sys/resource.h> -#include <unistd.h> -#endif - -#include <stdio.h> -#include <stdarg.h> -#include <time.h> - -#include "nsCOMPtr.h" -#include "nsIFile.h" -#include "nsStringGlue.h" - -#ifdef XP_WIN -#ifdef MOZ_ASAN -// ASAN requires firefox.exe to be built with -MD, and it's OK if we don't -// support Windows XP SP2 in ASAN builds. -#define XRE_DONT_SUPPORT_XPSP2 -#endif -#define XRE_WANT_ENVIRON -#define strcasecmp _stricmp -#ifdef MOZ_SANDBOX -#include "mozilla/sandboxing/SandboxInitialization.h" -#endif -#endif -#include "BinaryPath.h" - -#include "nsXPCOMPrivate.h" // for MAXPATHLEN and XPCOM_DLL - -#include "mozilla/Sprintf.h" -#include "mozilla/Telemetry.h" -#include "mozilla/WindowsDllBlocklist.h" - -#ifdef LIBFUZZER -#include "FuzzerDefs.h" -#endif - -#ifdef MOZ_LINUX_32_SSE2_STARTUP_ERROR -#include <cpuid.h> -#include "mozilla/Unused.h" - -static bool -IsSSE2Available() -{ - // The rest of the app has been compiled to assume that SSE2 is present - // unconditionally, so we can't use the normal copy of SSE.cpp here. - // Since SSE.cpp caches the results and we need them only transiently, - // instead of #including SSE.cpp here, let's just inline the specific check - // that's needed. - unsigned int level = 1u; - unsigned int eax, ebx, ecx, edx; - unsigned int bits = (1u<<26); - unsigned int max = __get_cpuid_max(0, nullptr); - if (level > max) { - return false; - } - __cpuid_count(level, 0, eax, ebx, ecx, edx); - return (edx & bits) == bits; -} - -static const char sSSE2Message[] = - "This browser version requires a processor with the SSE2 instruction " - "set extension.\nYou may be able to obtain a version that does not " - "require SSE2 from your Linux distribution.\n"; - -__attribute__((constructor)) -static void -SSE2Check() -{ - if (IsSSE2Available()) { - return; - } - // Using write() in order to avoid jemalloc-based buffering. Ignoring return - // values, since there isn't much we could do on failure and there is no - // point in trying to recover from errors. - MOZ_UNUSED(write(STDERR_FILENO, - sSSE2Message, - MOZ_ARRAY_LENGTH(sSSE2Message) - 1)); - // _exit() instead of exit() to avoid running the usual "at exit" code. - _exit(255); -} -#endif - -#if !defined(MOZ_WIDGET_COCOA) && !defined(MOZ_WIDGET_ANDROID) -#define MOZ_BROWSER_CAN_BE_CONTENTPROC -#include "../../ipc/contentproc/plugin-container.cpp" -#endif - -using namespace mozilla; - -#ifdef XP_MACOSX -#define kOSXResourcesFolder "Resources" -#endif -#define kDesktopFolder "browser" - -static void Output(const char *fmt, ... ) -{ - va_list ap; - va_start(ap, fmt); - -#ifndef XP_WIN - vfprintf(stderr, fmt, ap); -#else - char msg[2048]; - vsnprintf_s(msg, _countof(msg), _TRUNCATE, fmt, ap); - - wchar_t wide_msg[2048]; - MultiByteToWideChar(CP_UTF8, - 0, - msg, - -1, - wide_msg, - _countof(wide_msg)); -#if MOZ_WINCONSOLE - fwprintf_s(stderr, wide_msg); -#else - // Linking user32 at load-time interferes with the DLL blocklist (bug 932100). - // This is a rare codepath, so we can load user32 at run-time instead. - HMODULE user32 = LoadLibraryW(L"user32.dll"); - if (user32) { - decltype(MessageBoxW)* messageBoxW = - (decltype(MessageBoxW)*) GetProcAddress(user32, "MessageBoxW"); - if (messageBoxW) { - messageBoxW(nullptr, wide_msg, L"Basilisk", MB_OK - | MB_ICONERROR - | MB_SETFOREGROUND); - } - FreeLibrary(user32); - } -#endif -#endif - - va_end(ap); -} - -/** - * Return true if |arg| matches the given argument name. - */ -static bool IsArg(const char* arg, const char* s) -{ - if (*arg == '-') - { - if (*++arg == '-') - ++arg; - return !strcasecmp(arg, s); - } - -#if defined(XP_WIN) - if (*arg == '/') - return !strcasecmp(++arg, s); -#endif - - return false; -} - -Bootstrap::UniquePtr gBootstrap; - -static int do_main(int argc, char* argv[], char* envp[]) -{ - // Allow firefox.exe to launch XULRunner apps via -app <application.ini> - // Note that -app must be the *first* argument. - const char *appDataFile = getenv("XUL_APP_FILE"); - if ((!appDataFile || !*appDataFile) && - (argc > 1 && IsArg(argv[1], "app"))) { - if (argc == 2) { - Output("Incorrect number of arguments passed to -app"); - return 255; - } - appDataFile = argv[2]; - - char appEnv[MAXPATHLEN]; - SprintfLiteral(appEnv, "XUL_APP_FILE=%s", argv[2]); - if (putenv(strdup(appEnv))) { - Output("Couldn't set %s.\n", appEnv); - return 255; - } - argv[2] = argv[0]; - argv += 2; - argc -= 2; - } else if (argc > 1 && IsArg(argv[1], "xpcshell")) { - for (int i = 1; i < argc; i++) { - argv[i] = argv[i + 1]; - } - - XREShellData shellData; -#if defined(XP_WIN) && defined(MOZ_SANDBOX) - shellData.sandboxBrokerServices = - sandboxing::GetInitializedBrokerServices(); -#endif - - return gBootstrap->XRE_XPCShellMain(--argc, argv, envp, &shellData); - } - - BootstrapConfig config; - - if (appDataFile && *appDataFile) { - config.appData = nullptr; - config.appDataPath = appDataFile; - } else { - // no -app flag so we use the compiled-in app data - config.appData = &sAppData; - config.appDataPath = kDesktopFolder; - } - -#if defined(XP_WIN) && defined(MOZ_SANDBOX) - sandbox::BrokerServices* brokerServices = - sandboxing::GetInitializedBrokerServices(); -#if defined(MOZ_CONTENT_SANDBOX) - if (!brokerServices) { - Output("Couldn't initialize the broker services.\n"); - return 255; - } -#endif - config.sandboxBrokerServices = brokerServices; -#endif - -#ifdef LIBFUZZER - if (getenv("LIBFUZZER")) - gBootstrap->XRE_LibFuzzerSetDriver(fuzzer::FuzzerDriver); -#endif - - return gBootstrap->XRE_main(argc, argv, config); -} - -static nsresult -InitXPCOMGlue(const char *argv0) -{ - UniqueFreePtr<char> exePath = BinaryPath::Get(argv0); - if (!exePath) { - Output("Couldn't find the application directory.\n"); - return NS_ERROR_FAILURE; - } - - gBootstrap = mozilla::GetBootstrap(exePath.get()); - if (!gBootstrap) { - Output("Couldn't load XPCOM.\n"); - return NS_ERROR_FAILURE; - } - - // This will set this thread as the main thread. - gBootstrap->NS_LogInit(); - - return NS_OK; -} - -int main(int argc, char* argv[], char* envp[]) -{ - mozilla::TimeStamp start = mozilla::TimeStamp::Now(); - -#ifdef HAS_DLL_BLOCKLIST - DllBlocklist_Initialize(); -#endif - -#ifdef MOZ_BROWSER_CAN_BE_CONTENTPROC - // We are launching as a content process, delegate to the appropriate - // main - if (argc > 1 && IsArg(argv[1], "contentproc")) { -#if defined(XP_WIN) && defined(MOZ_SANDBOX) - // We need to initialize the sandbox TargetServices before InitXPCOMGlue - // because we might need the sandbox broker to give access to some files. - if (IsSandboxedProcess() && !sandboxing::GetInitializedTargetServices()) { - Output("Failed to initialize the sandbox target services."); - return 255; - } -#endif - - nsresult rv = InitXPCOMGlue(argv[0]); - if (NS_FAILED(rv)) { - return 255; - } - - int result = content_process_main(gBootstrap.get(), argc, argv); - - // InitXPCOMGlue calls NS_LogInit, so we need to balance it here. - gBootstrap->NS_LogTerm(); - - return result; - } -#endif - - - nsresult rv = InitXPCOMGlue(argv[0]); - if (NS_FAILED(rv)) { - return 255; - } - - gBootstrap->XRE_StartupTimelineRecord(mozilla::StartupTimeline::START, start); - -#ifdef MOZ_BROWSER_CAN_BE_CONTENTPROC - gBootstrap->XRE_EnableSameExecutableForContentProc(); -#endif - - int result = do_main(argc, argv, envp); - - gBootstrap->NS_LogTerm(); - -#ifdef XP_MACOSX - // Allow writes again. While we would like to catch writes from static - // destructors to allow early exits to use _exit, we know that there is - // at least one such write that we don't control (see bug 826029). For - // now we enable writes again and early exits will have to use exit instead - // of _exit. - gBootstrap->XRE_StopLateWriteChecks(); -#endif - - gBootstrap.reset(); - - return result; -} |