Bug 1797301 - Add lib with failure handling r=nika
[gecko.git] / ipc / glue / UtilityProcessImpl.cpp
blobb2f1e1399082da40721c766488ea2a9e4ab99c87
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "UtilityProcessImpl.h"
8 #include "mozilla/ipc/IOThreadChild.h"
9 #include "mozilla/GeckoArgs.h"
11 #if defined(OS_WIN) && defined(MOZ_SANDBOX)
12 # include "mozilla/sandboxTarget.h"
13 # include "WMF.h"
14 # include "WMFDecoderModule.h"
15 #endif
17 #if defined(XP_OPENBSD) && defined(MOZ_SANDBOX)
18 # include "mozilla/SandboxSettings.h"
19 #endif
21 namespace mozilla::ipc {
23 UtilityProcessImpl::~UtilityProcessImpl() = default;
25 #if defined(XP_WIN)
26 /* static */
27 void UtilityProcessImpl::LoadLibraryOrCrash(LPCWSTR aLib) {
28 HMODULE module = ::LoadLibraryW(aLib);
29 if (!module) {
30 MOZ_CRASH("Unable to preload module");
33 #endif // defined(XP_WIN)
35 bool UtilityProcessImpl::Init(int aArgc, char* aArgv[]) {
36 Maybe<uint64_t> sandboxingKind = geckoargs::sSandboxingKind.Get(aArgc, aArgv);
37 if (sandboxingKind.isNothing()) {
38 return false;
41 if (*sandboxingKind >= SandboxingKind::COUNT) {
42 return false;
45 #if defined(MOZ_SANDBOX) && defined(OS_WIN)
46 // We delay load winmm.dll so that its dependencies don't interfere with COM
47 // initialization when win32k is locked down. We need to load it before we
48 // lower the sandbox in processes where the policy will prevent loading.
49 ::LoadLibraryW(L"winmm.dll");
51 if (*sandboxingKind == SandboxingKind::GENERIC_UTILITY) {
52 // Preload audio generic libraries required for ffmpeg only
53 UtilityAudioDecoderParent::GenericPreloadForSandbox();
56 if (*sandboxingKind == SandboxingKind::UTILITY_AUDIO_DECODING_WMF
57 # ifdef MOZ_WMF_MEDIA_ENGINE
58 || *sandboxingKind == SandboxingKind::MF_MEDIA_ENGINE_CDM
59 # endif
60 ) {
61 UtilityAudioDecoderParent::WMFPreloadForSandbox();
64 // Go for it
65 mozilla::SandboxTarget::Instance()->StartSandbox();
66 #elif defined(__OpenBSD__) && defined(MOZ_SANDBOX)
67 StartOpenBSDSandbox(GeckoProcessType_Utility,
68 (SandboxingKind)*sandboxingKind);
69 #endif
71 Maybe<const char*> parentBuildID =
72 geckoargs::sParentBuildID.Get(aArgc, aArgv);
73 if (parentBuildID.isNothing()) {
74 return false;
77 if (!ProcessChild::InitPrefs(aArgc, aArgv)) {
78 return false;
81 return mUtility->Init(TakeInitialEndpoint(), nsCString(*parentBuildID),
82 *sandboxingKind);
85 void UtilityProcessImpl::CleanUp() { NS_ShutdownXPCOM(nullptr); }
87 } // namespace mozilla::ipc