From 5f8de423f190bbb79a62f804151bc24824fa32d8 Mon Sep 17 00:00:00 2001 From: "Matt A. Tobin" Date: Fri, 2 Feb 2018 04:16:08 -0500 Subject: Add m-esr52 at 52.6.0 --- dom/ipc/ContentProcess.cpp | 162 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 162 insertions(+) create mode 100644 dom/ipc/ContentProcess.cpp (limited to 'dom/ipc/ContentProcess.cpp') diff --git a/dom/ipc/ContentProcess.cpp b/dom/ipc/ContentProcess.cpp new file mode 100644 index 000000000..66125f332 --- /dev/null +++ b/dom/ipc/ContentProcess.cpp @@ -0,0 +1,162 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "mozilla/ipc/IOThreadChild.h" + +#include "ContentProcess.h" + +#if defined(XP_WIN) && defined(MOZ_CONTENT_SANDBOX) +#include "mozilla/WindowsVersion.h" +#endif + +#if defined(XP_MACOSX) && defined(MOZ_CONTENT_SANDBOX) +#include +#endif + +#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX) +#include "mozilla/Preferences.h" +#include "nsAppDirectoryServiceDefs.h" +#include "nsDirectoryService.h" +#include "nsDirectoryServiceDefs.h" +#endif + +using mozilla::ipc::IOThreadChild; + +namespace mozilla { +namespace dom { + +#if defined(XP_WIN) && defined(MOZ_CONTENT_SANDBOX) +static bool +IsSandboxTempDirRequired() +{ + // On Windows, a sandbox-writable temp directory is only used + // for Vista or later with sandbox pref level >= 1. + return (IsVistaOrLater() && + (Preferences::GetInt("security.sandbox.content.level") >= 1)); +} + +static void +SetTmpEnvironmentVariable(nsIFile* aValue) +{ + // Save the TMP environment variable so that is is picked up by GetTempPath(). + // Note that we specifically write to the TMP variable, as that is the first + // variable that is checked by GetTempPath() to determine its output. + nsAutoString fullTmpPath; + nsresult rv = aValue->GetPath(fullTmpPath); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + Unused << NS_WARN_IF(!SetEnvironmentVariableW(L"TMP", fullTmpPath.get())); + // We also set TEMP in case there is naughty third-party code that is + // referencing the environment variable directly. + Unused << NS_WARN_IF(!SetEnvironmentVariableW(L"TEMP", fullTmpPath.get())); +} +#endif + +#if defined(XP_MACOSX) && defined(MOZ_CONTENT_SANDBOX) +static bool +IsSandboxTempDirRequired() +{ + // On OSX, use the sandbox-writable temp when the pref level >= 1. + return (Preferences::GetInt("security.sandbox.content.level") >= 1); +} + +static void +SetTmpEnvironmentVariable(nsIFile* aValue) +{ + nsAutoCString fullTmpPath; + nsresult rv = aValue->GetNativePath(fullTmpPath); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + Unused << NS_WARN_IF(setenv("TMPDIR", fullTmpPath.get(), 1) != 0); +} +#endif + +#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX) +static void +SetUpSandboxEnvironment() +{ + MOZ_ASSERT(nsDirectoryService::gService, + "SetUpSandboxEnvironment relies on nsDirectoryService being initialized"); + + if (!IsSandboxTempDirRequired()) { + return; + } + + nsCOMPtr sandboxedContentTemp; + nsresult rv = + nsDirectoryService::gService->Get(NS_APP_CONTENT_PROCESS_TEMP_DIR, + NS_GET_IID(nsIFile), + getter_AddRefs(sandboxedContentTemp)); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + + // Change the gecko defined temp directory to our sandbox-writable one. + // Undefine returns a failure if the property is not already set. + Unused << nsDirectoryService::gService->Undefine(NS_OS_TEMP_DIR); + rv = nsDirectoryService::gService->Set(NS_OS_TEMP_DIR, sandboxedContentTemp); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + + SetTmpEnvironmentVariable(sandboxedContentTemp); +} +#endif + +void +ContentProcess::SetAppDir(const nsACString& aPath) +{ + mXREEmbed.SetAppDir(aPath); +} + +#if defined(XP_MACOSX) && defined(MOZ_CONTENT_SANDBOX) +void +ContentProcess::SetProfile(const nsACString& aProfile) +{ + bool flag; + nsresult rv = + XRE_GetFileFromPath(aProfile.BeginReading(), getter_AddRefs(mProfileDir)); + if (NS_FAILED(rv) || + NS_FAILED(mProfileDir->Exists(&flag)) || !flag) { + NS_WARNING("Invalid profile directory passed to content process."); + mProfileDir = nullptr; + } +} +#endif + +bool +ContentProcess::Init() +{ + mContent.Init(IOThreadChild::message_loop(), + ParentPid(), + IOThreadChild::channel()); + mXREEmbed.Start(); + mContent.InitXPCOM(); + mContent.InitGraphicsDeviceData(); + +#if (defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX) + mContent.SetProfileDir(mProfileDir); +#endif + +#if (defined(XP_WIN) || defined(XP_MACOSX)) && defined(MOZ_CONTENT_SANDBOX) + SetUpSandboxEnvironment(); +#endif + + return true; +} + +// Note: CleanUp() never gets called in non-debug builds because we exit early +// in ContentChild::ActorDestroy(). +void +ContentProcess::CleanUp() +{ + mXREEmbed.Stop(); +} + +} // namespace dom +} // namespace mozilla -- cgit v1.2.3