1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/strings/stringprintf.h"
6 #include "sandbox/win/src/handle_policy.h"
7 #include "sandbox/win/src/nt_internals.h"
8 #include "sandbox/win/src/sandbox.h"
9 #include "sandbox/win/src/sandbox_factory.h"
10 #include "sandbox/win/src/sandbox_policy.h"
11 #include "sandbox/win/src/win_utils.h"
12 #include "sandbox/win/tests/common/controller.h"
13 #include "testing/gtest/include/gtest/gtest.h"
17 // Just waits for the supplied number of milliseconds.
18 SBOX_TESTS_COMMAND
int Handle_WaitProcess(int argc
, wchar_t **argv
) {
20 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND
;
22 ::Sleep(::wcstoul(argv
[0], NULL
, 10));
23 return SBOX_TEST_TIMED_OUT
;
26 // Attempts to duplicate an event handle into the target process.
27 SBOX_TESTS_COMMAND
int Handle_DuplicateEvent(int argc
, wchar_t **argv
) {
29 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND
;
31 // Create a test event to use as a handle.
32 base::win::ScopedHandle test_event
;
33 test_event
.Set(::CreateEvent(NULL
, TRUE
, TRUE
, NULL
));
34 if (!test_event
.IsValid())
35 return SBOX_TEST_FIRST_ERROR
;
37 // Get the target process ID.
38 DWORD target_process_id
= ::wcstoul(argv
[0], NULL
, 10);
41 ResultCode result
= SandboxFactory::GetTargetServices()->DuplicateHandle(
42 test_event
, target_process_id
, &handle
, 0, DUPLICATE_SAME_ACCESS
);
44 return (result
== SBOX_ALL_OK
) ? SBOX_TEST_SUCCEEDED
: SBOX_TEST_DENIED
;
47 // Tests that duplicating an object works only when the policy allows it.
48 TEST(HandlePolicyTest
, DuplicateHandle
) {
52 // Kick off an asynchronous target process for testing.
53 target
.SetAsynchronous(true);
54 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, target
.RunTest(L
"Handle_WaitProcess 30000"));
56 // First test that we fail to open the event.
57 std::wstring cmd_line
= base::StringPrintf(L
"Handle_DuplicateEvent %d",
59 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(cmd_line
.c_str()));
61 // Now successfully open the event after adding a duplicate handle rule.
62 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_HANDLES
,
63 TargetPolicy::HANDLES_DUP_ANY
,
65 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(cmd_line
.c_str()));
68 // Tests that duplicating an object works only when the policy allows it.
69 TEST(HandlePolicyTest
, DuplicatePeerHandle
) {
73 // Kick off an asynchronous target process for testing.
74 target
.SetAsynchronous(true);
75 target
.SetUnsandboxed(true);
76 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, target
.RunTest(L
"Handle_WaitProcess 30000"));
78 // First test that we fail to open the event.
79 std::wstring cmd_line
= base::StringPrintf(L
"Handle_DuplicateEvent %d",
81 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(cmd_line
.c_str()));
83 // Now successfully open the event after adding a duplicate handle rule.
84 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_HANDLES
,
85 TargetPolicy::HANDLES_DUP_ANY
,
87 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(cmd_line
.c_str()));
90 // Tests that duplicating an object works only when the policy allows it.
91 TEST(HandlePolicyTest
, DuplicateBrokerHandle
) {
94 // First test that we fail to open the event.
95 std::wstring cmd_line
= base::StringPrintf(L
"Handle_DuplicateEvent %d",
96 ::GetCurrentProcessId());
97 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(cmd_line
.c_str()));
99 // Add the peer rule and make sure we fail again.
100 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_HANDLES
,
101 TargetPolicy::HANDLES_DUP_ANY
,
103 EXPECT_EQ(SBOX_TEST_DENIED
, runner
.RunTest(cmd_line
.c_str()));
106 // Now successfully open the event after adding a broker handle rule.
107 EXPECT_TRUE(runner
.AddRule(TargetPolicy::SUBSYS_HANDLES
,
108 TargetPolicy::HANDLES_DUP_BROKER
,
110 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(cmd_line
.c_str()));
113 } // namespace sandbox