blob: 11382da811f7e2fec1b3223148b6755f4a63e870 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/strings/stringprintf.h"
#include "sandbox/win/src/handle_policy.h"
#include "sandbox/win/src/nt_internals.h"
#include "sandbox/win/src/sandbox.h"
#include "sandbox/win/src/sandbox_factory.h"
#include "sandbox/win/src/sandbox_policy.h"
#include "sandbox/win/src/win_utils.h"
#include "sandbox/win/tests/common/controller.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace sandbox {
// Just waits for the supplied number of milliseconds.
SBOX_TESTS_COMMAND int Handle_WaitProcess(int argc, wchar_t **argv) {
if (argc != 1)
return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
::Sleep(::wcstoul(argv[0], NULL, 10));
return SBOX_TEST_TIMED_OUT;
}
// Attempts to duplicate an event handle into the target process.
SBOX_TESTS_COMMAND int Handle_DuplicateEvent(int argc, wchar_t **argv) {
if (argc != 1)
return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
// Create a test event to use as a handle.
base::win::ScopedHandle test_event;
test_event.Set(::CreateEvent(NULL, TRUE, TRUE, NULL));
if (!test_event.IsValid())
return SBOX_TEST_FIRST_ERROR;
// Get the target process ID.
DWORD target_process_id = ::wcstoul(argv[0], NULL, 10);
HANDLE handle = NULL;
ResultCode result = SandboxFactory::GetTargetServices()->DuplicateHandle(
test_event.Get(), target_process_id, &handle, 0, DUPLICATE_SAME_ACCESS);
return (result == SBOX_ALL_OK) ? SBOX_TEST_SUCCEEDED : SBOX_TEST_DENIED;
}
// Tests that duplicating an object works only when the policy allows it.
TEST(HandlePolicyTest, DuplicateHandle) {
TestRunner target;
TestRunner runner;
// Kick off an asynchronous target process for testing.
target.SetAsynchronous(true);
EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000"));
// First test that we fail to open the event.
base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
target.process_id());
EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
// Now successfully open the event after adding a duplicate handle rule.
EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
TargetPolicy::HANDLES_DUP_ANY,
L"Event"));
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
}
// Tests that duplicating an object works only when the policy allows it.
TEST(HandlePolicyTest, DuplicatePeerHandle) {
TestRunner target;
TestRunner runner;
// Kick off an asynchronous target process for testing.
target.SetAsynchronous(true);
target.SetUnsandboxed(true);
EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000"));
// First test that we fail to open the event.
base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
target.process_id());
EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
// Now successfully open the event after adding a duplicate handle rule.
EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
TargetPolicy::HANDLES_DUP_ANY,
L"Event"));
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
}
// Tests that duplicating an object works only when the policy allows it.
TEST(HandlePolicyTest, DuplicateBrokerHandle) {
TestRunner runner;
// First test that we fail to open the event.
base::string16 cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
::GetCurrentProcessId());
EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
// Add the peer rule and make sure we fail again.
EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
TargetPolicy::HANDLES_DUP_ANY,
L"Event"));
EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
// Now successfully open the event after adding a broker handle rule.
EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
TargetPolicy::HANDLES_DUP_BROKER,
L"Event"));
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
}
} // namespace sandbox