security/sandbox/win/src/handle_closer_test.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "base/strings/stringprintf.h"
     6 #include "base/win/scoped_handle.h"
     7 #include "sandbox/win/src/handle_closer_agent.h"
     8 #include "sandbox/win/src/sandbox.h"
     9 #include "sandbox/win/src/sandbox_factory.h"
    10 #include "sandbox/win/src/target_services.h"
    11 #include "sandbox/win/tests/common/controller.h"
    12 #include "testing/gtest/include/gtest/gtest.h"
    14 namespace {
    16 const wchar_t *kFileExtensions[] = { L".1", L".2", L".3", L".4" };
    18 // Returns a handle to a unique marker file that can be retrieved between runs.
    19 HANDLE GetMarkerFile(const wchar_t *extension) {
    20   wchar_t path_buffer[MAX_PATH + 1];
    21   CHECK(::GetTempPath(MAX_PATH, path_buffer));
    22   string16 marker_path = path_buffer;
    23   marker_path += L"\\sbox_marker_";
    25   // Generate a unique value from the exe's size and timestamp.
    26   CHECK(::GetModuleFileName(NULL, path_buffer, MAX_PATH));
    27   base::win::ScopedHandle module(::CreateFile(path_buffer,
    28                                  FILE_READ_ATTRIBUTES, FILE_SHARE_READ, NULL,
    29                                  OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL));
    30   CHECK(module.IsValid());
    31   FILETIME timestamp;
    32   CHECK(::GetFileTime(module, &timestamp, NULL, NULL));
    33   marker_path += base::StringPrintf(L"%08x%08x%08x",
    34                                     ::GetFileSize(module, NULL),
    35                                     timestamp.dwLowDateTime,
    36                                     timestamp.dwHighDateTime);
    37   marker_path += extension;
    39   // Make the file delete-on-close so cleanup is automatic.
    40   return CreateFile(marker_path.c_str(), FILE_ALL_ACCESS,
    41       FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
    42       NULL, OPEN_ALWAYS, FILE_FLAG_DELETE_ON_CLOSE, NULL);
    43 }
    45 // Used by the thread pool tests.
    46 HANDLE finish_event;
    47 const int kWaitCount = 20;
    49 }  // namespace
    51 namespace sandbox {
    53 // Checks for the presence of a list of files (in object path form).
    54 // Format: CheckForFileHandle (Y|N) \path\to\file1 [\path\to\file2 ...]
    55 // - Y or N depending if the file should exist or not.
    56 SBOX_TESTS_COMMAND int CheckForFileHandles(int argc, wchar_t **argv) {
    57   if (argc < 2)
    58     return SBOX_TEST_FAILED_TO_RUN_TEST;
    59   bool should_find = argv[0][0] == L'Y';
    60   if (argv[0][1] != L'\0' || !should_find && argv[0][0] != L'N')
    61     return SBOX_TEST_FAILED_TO_RUN_TEST;
    63   static int state = BEFORE_INIT;
    64   switch (state++) {
    65     case BEFORE_INIT:
    66       // Create a unique marker file that is open while the test is running.
    67       // The handles leak, but it will be closed by the test or on exit.
    68       for (int i = 0; i < arraysize(kFileExtensions); ++i)
    69         EXPECT_NE(GetMarkerFile(kFileExtensions[i]), INVALID_HANDLE_VALUE);
    70       return SBOX_TEST_SUCCEEDED;
    72     case AFTER_REVERT: {
    73       // Brute force the handle table to find what we're looking for.
    74       DWORD handle_count = UINT_MAX;
    75       const int kInvalidHandleThreshold = 100;
    76       const size_t kHandleOffset = sizeof(HANDLE);
    77       HANDLE handle = NULL;
    78       int invalid_count = 0;
    79       string16 handle_name;
    81       if (!::GetProcessHandleCount(::GetCurrentProcess(), &handle_count))
    82         return SBOX_TEST_FAILED_TO_RUN_TEST;
    84       while (handle_count && invalid_count < kInvalidHandleThreshold) {
    85         reinterpret_cast<size_t&>(handle) += kHandleOffset;
    86         if (GetHandleName(handle, &handle_name)) {
    87           for (int i = 1; i < argc; ++i) {
    88             if (handle_name == argv[i])
    89               return should_find ? SBOX_TEST_SUCCEEDED : SBOX_TEST_FAILED;
    90           }
    91           --handle_count;
    92         } else {
    93           ++invalid_count;
    94         }
    95       }
    97       return should_find ? SBOX_TEST_FAILED : SBOX_TEST_SUCCEEDED;
    98     }
   100     default:  // Do nothing.
   101       break;
   102   }
   104   return SBOX_TEST_SUCCEEDED;
   105 }
   107 TEST(HandleCloserTest, CheckForMarkerFiles) {
   108   TestRunner runner;
   109   runner.SetTimeout(2000);
   110   runner.SetTestState(EVERY_STATE);
   111   sandbox::TargetPolicy* policy = runner.GetPolicy();
   113   string16 command = string16(L"CheckForFileHandles Y");
   114   for (int i = 0; i < arraysize(kFileExtensions); ++i) {
   115     string16 handle_name;
   116     base::win::ScopedHandle marker(GetMarkerFile(kFileExtensions[i]));
   117     CHECK(marker.IsValid());
   118     CHECK(sandbox::GetHandleName(marker, &handle_name));
   119     command += (L" ");
   120     command += handle_name;
   121   }
   123   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(command.c_str())) <<
   124     "Failed: " << command;
   125 }
   127 TEST(HandleCloserTest, CloseMarkerFiles) {
   128   TestRunner runner;
   129   runner.SetTimeout(2000);
   130   runner.SetTestState(EVERY_STATE);
   131   sandbox::TargetPolicy* policy = runner.GetPolicy();
   133   string16 command = string16(L"CheckForFileHandles N");
   134   for (int i = 0; i < arraysize(kFileExtensions); ++i) {
   135     string16 handle_name;
   136     base::win::ScopedHandle marker(GetMarkerFile(kFileExtensions[i]));
   137     CHECK(marker.IsValid());
   138     CHECK(sandbox::GetHandleName(marker, &handle_name));
   139     CHECK_EQ(policy->AddKernelObjectToClose(L"File", handle_name.c_str()),
   140               SBOX_ALL_OK);
   141     command += (L" ");
   142     command += handle_name;
   143   }
   145   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(command.c_str())) <<
   146     "Failed: " << command;
   147 }
   149 void WINAPI ThreadPoolTask(void* event, BOOLEAN timeout) {
   150   static volatile LONG waiters_remaining = kWaitCount;
   151   CHECK(!timeout);
   152   CHECK(::CloseHandle(event));
   153   if (::InterlockedDecrement(&waiters_remaining) == 0)
   154     CHECK(::SetEvent(finish_event));
   155 }
   157 // Run a thread pool inside a sandbox without a CSRSS connection.
   158 SBOX_TESTS_COMMAND int RunThreadPool(int argc, wchar_t **argv) {
   159   HANDLE wait_list[20];
   160   CHECK(finish_event = ::CreateEvent(NULL, TRUE, FALSE, NULL));
   162   // Set up a bunch of waiters.
   163   HANDLE pool = NULL;
   164   for (int i = 0; i < kWaitCount; ++i) {
   165     HANDLE event = ::CreateEvent(NULL, TRUE, FALSE, NULL);
   166     CHECK(event);
   167     CHECK(::RegisterWaitForSingleObject(&pool, event, ThreadPoolTask, event,
   168                                         INFINITE, WT_EXECUTEONLYONCE));
   169     wait_list[i] = event;
   170   }
   172   // Signal all the waiters.
   173   for (int i = 0; i < kWaitCount; ++i)
   174     CHECK(::SetEvent(wait_list[i]));
   176   CHECK_EQ(::WaitForSingleObject(finish_event, INFINITE), WAIT_OBJECT_0);
   177   CHECK(::CloseHandle(finish_event));
   179   return SBOX_TEST_SUCCEEDED;
   180 }
   182 TEST(HandleCloserTest, RunThreadPool) {
   183   TestRunner runner;
   184   runner.SetTimeout(2000);
   185   runner.SetTestState(AFTER_REVERT);
   186   sandbox::TargetPolicy* policy = runner.GetPolicy();
   188   // Sever the CSRSS connection by closing ALPC ports inside the sandbox.
   189   CHECK_EQ(policy->AddKernelObjectToClose(L"ALPC Port", NULL), SBOX_ALL_OK);
   191   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"RunThreadPool"));
   192 }
   194 }  // namespace sandbox

mercurial