1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "sandbox/win/src/sync_policy_test.h"
7 #include "base/win/scoped_handle.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_policy.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/nt_internals.h"
12 #include "testing/gtest/include/gtest/gtest.h"
16 SBOX_TESTS_COMMAND
int Event_Open(int argc
, wchar_t **argv
) {
18 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND
;
20 DWORD desired_access
= SYNCHRONIZE
;
21 if (L
'f' == argv
[0][0])
22 desired_access
= EVENT_ALL_ACCESS
;
24 base::win::ScopedHandle
event_open(::OpenEvent(
25 desired_access
, FALSE
, argv
[1]));
26 DWORD error_open
= ::GetLastError();
28 if (event_open
.IsValid())
29 return SBOX_TEST_SUCCEEDED
;
31 if (ERROR_ACCESS_DENIED
== error_open
||
32 ERROR_BAD_PATHNAME
== error_open
||
33 ERROR_FILE_NOT_FOUND
== error_open
)
34 return SBOX_TEST_DENIED
;
36 return SBOX_TEST_FAILED
;
39 SBOX_TESTS_COMMAND
int Event_CreateOpen(int argc
, wchar_t **argv
) {
40 if (argc
< 2 || argc
> 3)
41 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND
;
43 wchar_t *event_name
= NULL
;
47 BOOL manual_reset
= FALSE
;
48 BOOL initial_state
= FALSE
;
49 if (L
't' == argv
[0][0])
51 if (L
't' == argv
[1][0])
54 base::win::ScopedHandle
event_create(::CreateEvent(
55 NULL
, manual_reset
, initial_state
, event_name
));
56 DWORD error_create
= ::GetLastError();
57 base::win::ScopedHandle event_open
;
59 event_open
.Set(::OpenEvent(EVENT_ALL_ACCESS
, FALSE
, event_name
));
61 if (event_create
.IsValid()) {
62 DWORD wait
= ::WaitForSingleObject(event_create
.Get(), 0);
63 if (initial_state
&& WAIT_OBJECT_0
!= wait
)
64 return SBOX_TEST_FAILED
;
66 if (!initial_state
&& WAIT_TIMEOUT
!= wait
)
67 return SBOX_TEST_FAILED
;
71 // Both event_open and event_create have to be valid.
72 if (event_open
.IsValid() && event_create
.IsValid())
73 return SBOX_TEST_SUCCEEDED
;
75 if (event_open
.IsValid() && !event_create
.IsValid() ||
76 !event_open
.IsValid() && event_create
.IsValid())
77 return SBOX_TEST_FAILED
;
79 // Only event_create has to be valid.
80 if (event_create
.Get())
81 return SBOX_TEST_SUCCEEDED
;
84 if (ERROR_ACCESS_DENIED
== error_create
||
85 ERROR_BAD_PATHNAME
== error_create
)
86 return SBOX_TEST_DENIED
;
88 return SBOX_TEST_FAILED
;
91 // Tests the creation of events using all the possible combinations.
92 TEST(SyncPolicyTest
, DISABLED_TestEvent
) {
94 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
95 TargetPolicy::EVENTS_ALLOW_ANY
,
97 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
98 TargetPolicy::EVENTS_ALLOW_ANY
,
101 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen f f"));
102 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen t f"));
103 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen f t"));
104 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen t t"));
105 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen f f test1"));
106 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen t f test2"));
107 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen f t test1"));
108 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen t t test2"));
109 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen f f test3"));
110 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen t f test4"));
111 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen f t test3"));
112 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen t t test4"));
115 // Tests opening events with read only access.
116 TEST(SyncPolicyTest
, DISABLED_TestEventReadOnly
) {
118 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
119 TargetPolicy::EVENTS_ALLOW_READONLY
,
121 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
122 TargetPolicy::EVENTS_ALLOW_READONLY
,
124 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
125 TargetPolicy::EVENTS_ALLOW_READONLY
,
127 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_SYNC
,
128 TargetPolicy::EVENTS_ALLOW_READONLY
,
131 base::win::ScopedHandle
handle1(::CreateEvent(NULL
, FALSE
, FALSE
, L
"test1"));
132 base::win::ScopedHandle
handle2(::CreateEvent(NULL
, FALSE
, FALSE
, L
"test2"));
133 base::win::ScopedHandle
handle3(::CreateEvent(NULL
, FALSE
, FALSE
, L
"test3"));
134 base::win::ScopedHandle
handle4(::CreateEvent(NULL
, FALSE
, FALSE
, L
"test4"));
136 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen f f"));
137 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_CreateOpen t f"));
138 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_Open f test1"));
139 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"Event_Open s test2"));
140 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_Open f test3"));
141 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_Open s test4"));
142 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen f f test5"));
143 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen t f test6"));
144 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen f t test5"));
145 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(L
"Event_CreateOpen t t test6"));
148 } // namespace sandbox