diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
commit | 6bf0a5cb5034a7e684dcc3500e841785237ce2dd (patch) | |
tree | a68f146d7fa01f0134297619fbe7e33db084e0aa /ipc/contentproc | |
parent | Initial commit. (diff) | |
download | thunderbird-6bf0a5cb5034a7e684dcc3500e841785237ce2dd.tar.xz thunderbird-6bf0a5cb5034a7e684dcc3500e841785237ce2dd.zip |
Adding upstream version 1:115.7.0.upstream/1%115.7.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'ipc/contentproc')
-rw-r--r-- | ipc/contentproc/plugin-container.cpp | 59 |
1 files changed, 59 insertions, 0 deletions
diff --git a/ipc/contentproc/plugin-container.cpp b/ipc/contentproc/plugin-container.cpp new file mode 100644 index 0000000000..62543f8826 --- /dev/null +++ b/ipc/contentproc/plugin-container.cpp @@ -0,0 +1,59 @@ +/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- + * vim: sw=2 ts=4 et : + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsXPCOM.h" +#include "nsXULAppAPI.h" +#include "mozilla/Bootstrap.h" +#include "XREChildData.h" + +#ifdef XP_WIN +# include <windows.h> +// we want a wmain entry point +# include "nsWindowsWMain.cpp" +#else +// FIXME/cjones testing +# include <unistd.h> +#endif + +#if defined(XP_WIN) && defined(MOZ_SANDBOX) +# include "mozilla/sandboxing/SandboxInitialization.h" +# include "mozilla/sandboxing/sandboxLogging.h" +#endif + +int content_process_main(mozilla::Bootstrap* bootstrap, int argc, + char* argv[]) { + // Check for the absolute minimum number of args we need to move + // forward here. We expect the last arg to be the child process type. + if (argc < 1) { + return 3; + } + + XREChildData childData; + +#if defined(XP_WIN) && defined(MOZ_SANDBOX) + if (IsSandboxedProcess()) { + childData.sandboxTargetServices = + mozilla::sandboxing::GetInitializedTargetServices(); + if (!childData.sandboxTargetServices) { + return 1; + } + + childData.ProvideLogFunction = mozilla::sandboxing::ProvideLogFunction; + } +#endif + + bootstrap->XRE_SetProcessType(argv[--argc]); + +#if defined(XP_WIN) && defined(MOZ_SANDBOX) + if (bootstrap->XRE_GetProcessType() == GeckoProcessType_RemoteSandboxBroker) { + childData.sandboxBrokerServices = + mozilla::sandboxing::GetInitializedBrokerServices(); + } +#endif + + nsresult rv = bootstrap->XRE_InitChildProcess(argc, argv, &childData); + return NS_FAILED(rv); +} |