1 // Copyright 2014 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "sandbox/mac/bootstrap_sandbox.h" 6 7 #include <CoreFoundation/CoreFoundation.h> 8 #import <Foundation/Foundation.h> 9 #include <mach/mach.h> 10 #include <servers/bootstrap.h> 11 12 #include "base/logging.h" 13 #include "base/mac/mac_util.h" 14 #include "base/mac/scoped_nsobject.h" 15 #include "base/mac/scoped_mach_port.h" 16 #include "base/process/kill.h" 17 #include "base/test/multiprocess_test.h" 18 #include "base/test/test_timeouts.h" 19 #import "testing/gtest_mac.h" 20 #include "testing/multiprocess_func_list.h" 21 22 NSString* const kTestNotification = @"org.chromium.bootstrap_sandbox_test"; 23 24 @interface DistributedNotificationObserver : NSObject { 25 @private 26 int receivedCount_; 27 base::scoped_nsobject<NSString> object_; 28 } 29 - (int)receivedCount; 30 - (NSString*)object; 31 - (void)waitForNotification; 32 @end 33 34 @implementation DistributedNotificationObserver 35 - (id)init { 36 if ((self = [super init])) { 37 [[NSDistributedNotificationCenter defaultCenter] 38 addObserver:self 39 selector:@selector(observeNotification:) 40 name:kTestNotification 41 object:nil]; 42 } 43 return self; 44 } 45 46 - (void)dealloc { 47 [[NSDistributedNotificationCenter defaultCenter] 48 removeObserver:self 49 name:kTestNotification 50 object:nil]; 51 [super dealloc]; 52 } 53 54 - (int)receivedCount { 55 return receivedCount_; 56 } 57 58 - (NSString*)object { 59 return object_.get(); 60 } 61 62 - (void)waitForNotification { 63 object_.reset(); 64 CFRunLoopRunInMode(kCFRunLoopDefaultMode, 65 TestTimeouts::action_timeout().InSeconds(), false); 66 } 67 68 - (void)observeNotification:(NSNotification*)notification { 69 ++receivedCount_; 70 object_.reset([[notification object] copy]); 71 CFRunLoopStop(CFRunLoopGetCurrent()); 72 } 73 @end 74 75 //////////////////////////////////////////////////////////////////////////////// 76 77 namespace sandbox { 78 79 class BootstrapSandboxTest : public base::MultiProcessTest { 80 public: 81 virtual void SetUp() OVERRIDE { 82 base::MultiProcessTest::SetUp(); 83 84 sandbox_ = BootstrapSandbox::Create(); 85 ASSERT_TRUE(sandbox_.get()); 86 } 87 88 BootstrapSandboxPolicy BaselinePolicy() { 89 BootstrapSandboxPolicy policy; 90 if (base::mac::IsOSSnowLeopard()) 91 policy.rules["com.apple.SecurityServer"] = Rule(POLICY_ALLOW); 92 return policy; 93 } 94 95 void RunChildWithPolicy(int policy_id, 96 const char* child_name, 97 base::ProcessHandle* out_pid) { 98 sandbox_->PrepareToForkWithPolicy(policy_id); 99 base::LaunchOptions options; 100 options.replacement_bootstrap_name = sandbox_->server_bootstrap_name(); 101 base::ProcessHandle pid = SpawnChildWithOptions(child_name, options); 102 ASSERT_GT(pid, 0); 103 sandbox_->FinishedFork(pid); 104 int code = 0; 105 EXPECT_TRUE(base::WaitForExitCode(pid, &code)); 106 EXPECT_EQ(0, code); 107 if (out_pid) 108 *out_pid = pid; 109 } 110 111 protected: 112 scoped_ptr<BootstrapSandbox> sandbox_; 113 }; 114 115 const char kNotificationTestMain[] = "PostNotification"; 116 117 // Run the test without the sandbox. 118 TEST_F(BootstrapSandboxTest, DistributedNotifications_Unsandboxed) { 119 base::scoped_nsobject<DistributedNotificationObserver> observer( 120 [[DistributedNotificationObserver alloc] init]); 121 122 base::ProcessHandle pid = SpawnChild(kNotificationTestMain); 123 ASSERT_GT(pid, 0); 124 int code = 0; 125 EXPECT_TRUE(base::WaitForExitCode(pid, &code)); 126 EXPECT_EQ(0, code); 127 128 [observer waitForNotification]; 129 EXPECT_EQ(1, [observer receivedCount]); 130 EXPECT_EQ(pid, [[observer object] intValue]); 131 } 132 133 // Run the test with the sandbox enabled without notifications on the policy 134 // whitelist. 135 TEST_F(BootstrapSandboxTest, DistributedNotifications_SandboxDeny) { 136 base::scoped_nsobject<DistributedNotificationObserver> observer( 137 [[DistributedNotificationObserver alloc] init]); 138 139 sandbox_->RegisterSandboxPolicy(1, BaselinePolicy()); 140 RunChildWithPolicy(1, kNotificationTestMain, NULL); 141 142 [observer waitForNotification]; 143 EXPECT_EQ(0, [observer receivedCount]); 144 EXPECT_EQ(nil, [observer object]); 145 } 146 147 // Run the test with notifications permitted. 148 TEST_F(BootstrapSandboxTest, DistributedNotifications_SandboxAllow) { 149 base::scoped_nsobject<DistributedNotificationObserver> observer( 150 [[DistributedNotificationObserver alloc] init]); 151 152 BootstrapSandboxPolicy policy(BaselinePolicy()); 153 // 10.9: 154 policy.rules["com.apple.distributed_notifications@Uv3"] = Rule(POLICY_ALLOW); 155 policy.rules["com.apple.distributed_notifications@1v3"] = Rule(POLICY_ALLOW); 156 // 10.6: 157 policy.rules["com.apple.system.notification_center"] = Rule(POLICY_ALLOW); 158 policy.rules["com.apple.distributed_notifications.2"] = Rule(POLICY_ALLOW); 159 sandbox_->RegisterSandboxPolicy(2, policy); 160 161 base::ProcessHandle pid; 162 RunChildWithPolicy(2, kNotificationTestMain, &pid); 163 164 [observer waitForNotification]; 165 EXPECT_EQ(1, [observer receivedCount]); 166 EXPECT_EQ(pid, [[observer object] intValue]); 167 } 168 169 MULTIPROCESS_TEST_MAIN(PostNotification) { 170 [[NSDistributedNotificationCenter defaultCenter] 171 postNotificationName:kTestNotification 172 object:[NSString stringWithFormat:@"%d", getpid()]]; 173 return 0; 174 } 175 176 const char kTestServer[] = "org.chromium.test_bootstrap_server"; 177 178 TEST_F(BootstrapSandboxTest, PolicyDenyError) { 179 BootstrapSandboxPolicy policy(BaselinePolicy()); 180 policy.rules[kTestServer] = Rule(POLICY_DENY_ERROR); 181 sandbox_->RegisterSandboxPolicy(1, policy); 182 183 RunChildWithPolicy(1, "PolicyDenyError", NULL); 184 } 185 186 MULTIPROCESS_TEST_MAIN(PolicyDenyError) { 187 mach_port_t port = MACH_PORT_NULL; 188 kern_return_t kr = bootstrap_look_up(bootstrap_port, kTestServer, 189 &port); 190 CHECK_EQ(BOOTSTRAP_UNKNOWN_SERVICE, kr); 191 CHECK(port == MACH_PORT_NULL); 192 193 kr = bootstrap_look_up(bootstrap_port, "org.chromium.some_other_server", 194 &port); 195 CHECK_EQ(BOOTSTRAP_UNKNOWN_SERVICE, kr); 196 CHECK(port == MACH_PORT_NULL); 197 198 return 0; 199 } 200 201 TEST_F(BootstrapSandboxTest, PolicyDenyDummyPort) { 202 BootstrapSandboxPolicy policy(BaselinePolicy()); 203 policy.rules[kTestServer] = Rule(POLICY_DENY_DUMMY_PORT); 204 sandbox_->RegisterSandboxPolicy(1, policy); 205 206 RunChildWithPolicy(1, "PolicyDenyDummyPort", NULL); 207 } 208 209 MULTIPROCESS_TEST_MAIN(PolicyDenyDummyPort) { 210 mach_port_t port = MACH_PORT_NULL; 211 kern_return_t kr = bootstrap_look_up(bootstrap_port, kTestServer, 212 &port); 213 CHECK_EQ(KERN_SUCCESS, kr); 214 CHECK(port != MACH_PORT_NULL); 215 return 0; 216 } 217 218 struct SubstitutePortAckSend { 219 mach_msg_header_t header; 220 char buf[32]; 221 }; 222 223 struct SubstitutePortAckRecv : public SubstitutePortAckSend { 224 mach_msg_trailer_t trailer; 225 }; 226 227 const char kSubstituteAck[] = "Hello, this is doge!"; 228 229 TEST_F(BootstrapSandboxTest, PolicySubstitutePort) { 230 mach_port_t task = mach_task_self(); 231 232 mach_port_t port; 233 ASSERT_EQ(KERN_SUCCESS, mach_port_allocate(task, MACH_PORT_RIGHT_RECEIVE, 234 &port)); 235 base::mac::ScopedMachReceiveRight scoped_port(port); 236 237 mach_port_urefs_t send_rights = 0; 238 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 239 &send_rights)); 240 EXPECT_EQ(0u, send_rights); 241 242 ASSERT_EQ(KERN_SUCCESS, mach_port_insert_right(task, port, port, 243 MACH_MSG_TYPE_MAKE_SEND)); 244 base::mac::ScopedMachSendRight scoped_port_send(port); 245 246 send_rights = 0; 247 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 248 &send_rights)); 249 EXPECT_EQ(1u, send_rights); 250 251 BootstrapSandboxPolicy policy(BaselinePolicy()); 252 policy.rules[kTestServer] = Rule(port); 253 sandbox_->RegisterSandboxPolicy(1, policy); 254 255 RunChildWithPolicy(1, "PolicySubstitutePort", NULL); 256 257 struct SubstitutePortAckRecv msg; 258 bzero(&msg, sizeof(msg)); 259 msg.header.msgh_size = sizeof(msg); 260 msg.header.msgh_local_port = port; 261 kern_return_t kr = mach_msg(&msg.header, MACH_RCV_MSG, 0, 262 msg.header.msgh_size, port, 263 TestTimeouts::tiny_timeout().InMilliseconds(), MACH_PORT_NULL); 264 EXPECT_EQ(KERN_SUCCESS, kr); 265 266 send_rights = 0; 267 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 268 &send_rights)); 269 EXPECT_EQ(1u, send_rights); 270 271 EXPECT_EQ(0, strncmp(kSubstituteAck, msg.buf, sizeof(msg.buf))); 272 } 273 274 MULTIPROCESS_TEST_MAIN(PolicySubstitutePort) { 275 mach_port_t port = MACH_PORT_NULL; 276 kern_return_t kr = bootstrap_look_up(bootstrap_port, kTestServer, &port); 277 CHECK_EQ(KERN_SUCCESS, kr); 278 CHECK(port != MACH_PORT_NULL); 279 280 struct SubstitutePortAckSend msg; 281 bzero(&msg, sizeof(msg)); 282 msg.header.msgh_size = sizeof(msg); 283 msg.header.msgh_remote_port = port; 284 msg.header.msgh_bits = MACH_MSGH_BITS_REMOTE(MACH_MSG_TYPE_MOVE_SEND); 285 strncpy(msg.buf, kSubstituteAck, sizeof(msg.buf)); 286 287 CHECK_EQ(KERN_SUCCESS, mach_msg_send(&msg.header)); 288 289 return 0; 290 } 291 292 TEST_F(BootstrapSandboxTest, ForwardMessageInProcess) { 293 mach_port_t task = mach_task_self(); 294 295 mach_port_t port; 296 ASSERT_EQ(KERN_SUCCESS, mach_port_allocate(task, MACH_PORT_RIGHT_RECEIVE, 297 &port)); 298 base::mac::ScopedMachReceiveRight scoped_port_recv(port); 299 300 mach_port_urefs_t send_rights = 0; 301 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 302 &send_rights)); 303 EXPECT_EQ(0u, send_rights); 304 305 ASSERT_EQ(KERN_SUCCESS, mach_port_insert_right(task, port, port, 306 MACH_MSG_TYPE_MAKE_SEND)); 307 base::mac::ScopedMachSendRight scoped_port_send(port); 308 309 send_rights = 0; 310 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 311 &send_rights)); 312 EXPECT_EQ(1u, send_rights); 313 314 mach_port_t bp; 315 ASSERT_EQ(KERN_SUCCESS, task_get_bootstrap_port(task, &bp)); 316 base::mac::ScopedMachSendRight scoped_bp(bp); 317 318 char service_name[] = "org.chromium.sandbox.test.ForwardMessageInProcess"; 319 #pragma GCC diagnostic push 320 #pragma GCC diagnostic ignored "-Wdeprecated-declarations" 321 kern_return_t kr = bootstrap_register(bp, service_name, port); 322 #pragma GCC diagnostic pop 323 EXPECT_EQ(KERN_SUCCESS, kr); 324 325 send_rights = 0; 326 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 327 &send_rights)); 328 EXPECT_EQ(1u, send_rights); 329 330 mach_port_t service_port; 331 EXPECT_EQ(KERN_SUCCESS, bootstrap_look_up(bp, service_name, &service_port)); 332 base::mac::ScopedMachSendRight scoped_service_port(service_port); 333 334 send_rights = 0; 335 ASSERT_EQ(KERN_SUCCESS, mach_port_get_refs(task, port, MACH_PORT_RIGHT_SEND, 336 &send_rights)); 337 // On 10.6, bootstrap_lookup2 may add an extra right to place it in a per- 338 // process cache. 339 if (base::mac::IsOSSnowLeopard()) 340 EXPECT_TRUE(send_rights == 3u || send_rights == 2u) << send_rights; 341 else 342 EXPECT_EQ(2u, send_rights); 343 } 344 345 const char kDefaultRuleTestAllow[] = 346 "org.chromium.sandbox.test.DefaultRuleAllow"; 347 const char kDefaultRuleTestDeny[] = 348 "org.chromium.sandbox.test.DefaultRuleAllow.Deny"; 349 350 TEST_F(BootstrapSandboxTest, DefaultRuleAllow) { 351 mach_port_t task = mach_task_self(); 352 353 mach_port_t port; 354 ASSERT_EQ(KERN_SUCCESS, mach_port_allocate(task, MACH_PORT_RIGHT_RECEIVE, 355 &port)); 356 base::mac::ScopedMachReceiveRight scoped_port_recv(port); 357 358 ASSERT_EQ(KERN_SUCCESS, mach_port_insert_right(task, port, port, 359 MACH_MSG_TYPE_MAKE_SEND)); 360 base::mac::ScopedMachSendRight scoped_port_send(port); 361 362 BootstrapSandboxPolicy policy; 363 policy.default_rule = Rule(POLICY_ALLOW); 364 policy.rules[kDefaultRuleTestAllow] = Rule(port); 365 policy.rules[kDefaultRuleTestDeny] = Rule(POLICY_DENY_ERROR); 366 sandbox_->RegisterSandboxPolicy(3, policy); 367 368 base::scoped_nsobject<DistributedNotificationObserver> observer( 369 [[DistributedNotificationObserver alloc] init]); 370 371 int pid = 0; 372 RunChildWithPolicy(3, "DefaultRuleAllow", &pid); 373 EXPECT_GT(pid, 0); 374 375 [observer waitForNotification]; 376 EXPECT_EQ(1, [observer receivedCount]); 377 EXPECT_EQ(pid, [[observer object] intValue]); 378 379 struct SubstitutePortAckRecv msg; 380 bzero(&msg, sizeof(msg)); 381 msg.header.msgh_size = sizeof(msg); 382 msg.header.msgh_local_port = port; 383 kern_return_t kr = mach_msg(&msg.header, MACH_RCV_MSG, 0, 384 msg.header.msgh_size, port, 385 TestTimeouts::tiny_timeout().InMilliseconds(), MACH_PORT_NULL); 386 EXPECT_EQ(KERN_SUCCESS, kr); 387 388 EXPECT_EQ(0, strncmp(kSubstituteAck, msg.buf, sizeof(msg.buf))); 389 } 390 391 MULTIPROCESS_TEST_MAIN(DefaultRuleAllow) { 392 [[NSDistributedNotificationCenter defaultCenter] 393 postNotificationName:kTestNotification 394 object:[NSString stringWithFormat:@"%d", getpid()]]; 395 396 mach_port_t port = MACH_PORT_NULL; 397 CHECK_EQ(BOOTSTRAP_UNKNOWN_SERVICE, bootstrap_look_up(bootstrap_port, 398 const_cast<char*>(kDefaultRuleTestDeny), &port)); 399 CHECK(port == MACH_PORT_NULL); 400 401 CHECK_EQ(KERN_SUCCESS, bootstrap_look_up(bootstrap_port, 402 const_cast<char*>(kDefaultRuleTestAllow), &port)); 403 CHECK(port != MACH_PORT_NULL); 404 405 struct SubstitutePortAckSend msg; 406 bzero(&msg, sizeof(msg)); 407 msg.header.msgh_size = sizeof(msg); 408 msg.header.msgh_remote_port = port; 409 msg.header.msgh_bits = MACH_MSGH_BITS_REMOTE(MACH_MSG_TYPE_MOVE_SEND); 410 strncpy(msg.buf, kSubstituteAck, sizeof(msg.buf)); 411 412 CHECK_EQ(KERN_SUCCESS, mach_msg_send(&msg.header)); 413 414 return 0; 415 } 416 417 } // namespace sandbox 418