1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "sandbox/win/src/sync_policy_test.h"
6
7 #include "base/win/scoped_handle.h"
8 #include "sandbox/win/src/nt_internals.h"
9 #include "sandbox/win/src/sandbox.h"
10 #include "sandbox/win/src/sandbox_factory.h"
11 #include "sandbox/win/src/sandbox_policy.h"
12 #include "testing/gtest/include/gtest/gtest.h"
13
14 namespace sandbox {
15
Event_Open(int argc,wchar_t ** argv)16 SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t** argv) {
17 if (argc != 2)
18 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
19
20 DWORD desired_access = SYNCHRONIZE;
21 if (L'f' == argv[0][0])
22 desired_access = EVENT_ALL_ACCESS;
23
24 base::win::ScopedHandle event_open(
25 ::OpenEvent(desired_access, false, argv[1]));
26 DWORD error_open = ::GetLastError();
27
28 if (event_open.IsValid())
29 return SBOX_TEST_SUCCEEDED;
30
31 if (ERROR_ACCESS_DENIED == error_open || ERROR_BAD_PATHNAME == error_open ||
32 ERROR_FILE_NOT_FOUND == error_open)
33 return SBOX_TEST_DENIED;
34
35 return SBOX_TEST_FAILED;
36 }
37
Event_CreateOpen(int argc,wchar_t ** argv)38 SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t** argv) {
39 if (argc < 2 || argc > 3)
40 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND;
41
42 wchar_t* event_name = nullptr;
43 if (3 == argc)
44 event_name = argv[2];
45
46 bool manual_reset = false;
47 bool initial_state = false;
48 if (L't' == argv[0][0])
49 manual_reset = true;
50 if (L't' == argv[1][0])
51 initial_state = true;
52
53 base::win::ScopedHandle event_create(
54 ::CreateEvent(nullptr, manual_reset, initial_state, event_name));
55 DWORD error_create = ::GetLastError();
56 base::win::ScopedHandle event_open;
57 if (event_name)
58 event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, false, event_name));
59
60 if (event_create.IsValid()) {
61 DWORD wait = ::WaitForSingleObject(event_create.Get(), 0);
62 if (initial_state && WAIT_OBJECT_0 != wait)
63 return SBOX_TEST_FAILED;
64
65 if (!initial_state && WAIT_TIMEOUT != wait)
66 return SBOX_TEST_FAILED;
67 }
68
69 if (event_name) {
70 // Both event_open and event_create have to be valid.
71 if (event_open.IsValid() && event_create.IsValid())
72 return SBOX_TEST_SUCCEEDED;
73
74 if ((event_open.IsValid() && !event_create.IsValid()) ||
75 (!event_open.IsValid() && event_create.IsValid())) {
76 return SBOX_TEST_FAILED;
77 }
78 } else {
79 // Only event_create has to be valid.
80 if (event_create.Get())
81 return SBOX_TEST_SUCCEEDED;
82 }
83
84 if (ERROR_ACCESS_DENIED == error_create || ERROR_BAD_PATHNAME == error_create)
85 return SBOX_TEST_DENIED;
86
87 return SBOX_TEST_FAILED;
88 }
89
90 // Tests the creation of events using all the possible combinations.
TEST(SyncPolicyTest,TestEvent)91 TEST(SyncPolicyTest, TestEvent) {
92 TestRunner runner;
93 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
94 TargetPolicy::EVENTS_ALLOW_ANY, L"test1"));
95 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
96 TargetPolicy::EVENTS_ALLOW_ANY, L"test2"));
97
98 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
99 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
100 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t"));
101 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t"));
102 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1"));
103 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2"));
104 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1"));
105 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2"));
106 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3"));
107 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4"));
108 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3"));
109 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4"));
110 }
111
112 // Tests opening events with read only access.
TEST(SyncPolicyTest,TestEventReadOnly)113 TEST(SyncPolicyTest, TestEventReadOnly) {
114 TestRunner runner;
115 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
116 TargetPolicy::EVENTS_ALLOW_READONLY, L"test1"));
117 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
118 TargetPolicy::EVENTS_ALLOW_READONLY, L"test2"));
119 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
120 TargetPolicy::EVENTS_ALLOW_READONLY, L"test5"));
121 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC,
122 TargetPolicy::EVENTS_ALLOW_READONLY, L"test6"));
123
124 base::win::ScopedHandle handle1(
125 ::CreateEvent(nullptr, false, false, L"test1"));
126 base::win::ScopedHandle handle2(
127 ::CreateEvent(nullptr, false, false, L"test2"));
128 base::win::ScopedHandle handle3(
129 ::CreateEvent(nullptr, false, false, L"test3"));
130 base::win::ScopedHandle handle4(
131 ::CreateEvent(nullptr, false, false, L"test4"));
132
133 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f"));
134 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f"));
135 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1"));
136 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2"));
137 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3"));
138 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4"));
139 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5"));
140 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6"));
141 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5"));
142 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6"));
143 }
144
145 } // namespace sandbox
146