security/sandbox/win/src/handle_policy_test.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "base/strings/stringprintf.h"
     6 #include "sandbox/win/src/handle_policy.h"
     7 #include "sandbox/win/src/nt_internals.h"
     8 #include "sandbox/win/src/sandbox.h"
     9 #include "sandbox/win/src/sandbox_factory.h"
    10 #include "sandbox/win/src/sandbox_policy.h"
    11 #include "sandbox/win/src/win_utils.h"
    12 #include "sandbox/win/tests/common/controller.h"
    13 #include "testing/gtest/include/gtest/gtest.h"
    15 namespace sandbox {
    17 // Just waits for the supplied number of milliseconds.
    18 SBOX_TESTS_COMMAND int Handle_WaitProcess(int argc, wchar_t **argv) {
    19   if (argc != 1)
    20     return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
    22   ::Sleep(::wcstoul(argv[0], NULL, 10));
    23   return SBOX_TEST_TIMED_OUT;
    24 }
    26 // Attempts to duplicate an event handle into the target process.
    27 SBOX_TESTS_COMMAND int Handle_DuplicateEvent(int argc, wchar_t **argv) {
    28   if (argc != 1)
    29     return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
    31   // Create a test event to use as a handle.
    32   base::win::ScopedHandle test_event;
    33   test_event.Set(::CreateEvent(NULL, TRUE, TRUE, NULL));
    34   if (!test_event.IsValid())
    35     return SBOX_TEST_FIRST_ERROR;
    37   // Get the target process ID.
    38   DWORD target_process_id = ::wcstoul(argv[0], NULL, 10);
    40   HANDLE handle = NULL;
    41   ResultCode result = SandboxFactory::GetTargetServices()->DuplicateHandle(
    42       test_event, target_process_id, &handle, 0, DUPLICATE_SAME_ACCESS);
    44   return (result == SBOX_ALL_OK) ? SBOX_TEST_SUCCEEDED : SBOX_TEST_DENIED;
    45 }
    47 // Tests that duplicating an object works only when the policy allows it.
    48 TEST(HandlePolicyTest, DuplicateHandle) {
    49   TestRunner target;
    50   TestRunner runner;
    52   // Kick off an asynchronous target process for testing.
    53   target.SetAsynchronous(true);
    54   EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000"));
    56   // First test that we fail to open the event.
    57   std::wstring cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
    58                                              target.process_id());
    59   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
    61   // Now successfully open the event after adding a duplicate handle rule.
    62   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
    63                              TargetPolicy::HANDLES_DUP_ANY,
    64                              L"Event"));
    65   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
    66 }
    68 // Tests that duplicating an object works only when the policy allows it.
    69 TEST(HandlePolicyTest, DuplicatePeerHandle) {
    70   TestRunner target;
    71   TestRunner runner;
    73   // Kick off an asynchronous target process for testing.
    74   target.SetAsynchronous(true);
    75   target.SetUnsandboxed(true);
    76   EXPECT_EQ(SBOX_TEST_SUCCEEDED, target.RunTest(L"Handle_WaitProcess 30000"));
    78   // First test that we fail to open the event.
    79   std::wstring cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
    80                                              target.process_id());
    81   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
    83   // Now successfully open the event after adding a duplicate handle rule.
    84   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
    85                              TargetPolicy::HANDLES_DUP_ANY,
    86                              L"Event"));
    87   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
    88 }
    90 // Tests that duplicating an object works only when the policy allows it.
    91 TEST(HandlePolicyTest, DuplicateBrokerHandle) {
    92   TestRunner runner;
    94   // First test that we fail to open the event.
    95   std::wstring cmd_line = base::StringPrintf(L"Handle_DuplicateEvent %d",
    96                                              ::GetCurrentProcessId());
    97   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
    99   // Add the peer rule and make sure we fail again.
   100   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
   101                              TargetPolicy::HANDLES_DUP_ANY,
   102                              L"Event"));
   103   EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(cmd_line.c_str()));
   106   // Now successfully open the event after adding a broker handle rule.
   107   EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_HANDLES,
   108                              TargetPolicy::HANDLES_DUP_BROKER,
   109                              L"Event"));
   110   EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(cmd_line.c_str()));
   111 }
   113 }  // namespace sandbox

mercurial