1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include "sandbox/win/src/sync_policy_test.h" 6 7 #include "base/win/scoped_handle.h" 8 #include "sandbox/win/src/sandbox.h" 9 #include "sandbox/win/src/sandbox_policy.h" 10 #include "sandbox/win/src/sandbox_factory.h" 11 #include "sandbox/win/src/nt_internals.h" 12 #include "testing/gtest/include/gtest/gtest.h" 13 14 namespace sandbox { 15 16 SBOX_TESTS_COMMAND int Event_Open(int argc, wchar_t **argv) { 17 if (argc != 2) 18 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 19 20 DWORD desired_access = SYNCHRONIZE; 21 if (L'f' == argv[0][0]) 22 desired_access = EVENT_ALL_ACCESS; 23 24 base::win::ScopedHandle event_open(::OpenEvent( 25 desired_access, FALSE, argv[1])); 26 DWORD error_open = ::GetLastError(); 27 28 if (event_open.IsValid()) 29 return SBOX_TEST_SUCCEEDED; 30 31 if (ERROR_ACCESS_DENIED == error_open || 32 ERROR_BAD_PATHNAME == error_open) 33 return SBOX_TEST_DENIED; 34 35 return SBOX_TEST_FAILED; 36 } 37 38 SBOX_TESTS_COMMAND int Event_CreateOpen(int argc, wchar_t **argv) { 39 if (argc < 2 || argc > 3) 40 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; 41 42 wchar_t *event_name = NULL; 43 if (3 == argc) 44 event_name = argv[2]; 45 46 BOOL manual_reset = FALSE; 47 BOOL initial_state = FALSE; 48 if (L't' == argv[0][0]) 49 manual_reset = TRUE; 50 if (L't' == argv[1][0]) 51 initial_state = TRUE; 52 53 base::win::ScopedHandle event_create(::CreateEvent( 54 NULL, manual_reset, initial_state, event_name)); 55 DWORD error_create = ::GetLastError(); 56 base::win::ScopedHandle event_open; 57 if (event_name) 58 event_open.Set(::OpenEvent(EVENT_ALL_ACCESS, FALSE, event_name)); 59 60 if (event_create.IsValid()) { 61 DWORD wait = ::WaitForSingleObject(event_create.Get(), 0); 62 if (initial_state && WAIT_OBJECT_0 != wait) 63 return SBOX_TEST_FAILED; 64 65 if (!initial_state && WAIT_TIMEOUT != wait) 66 return SBOX_TEST_FAILED; 67 } 68 69 if (event_name) { 70 // Both event_open and event_create have to be valid. 71 if (event_open.IsValid() && event_create.IsValid()) 72 return SBOX_TEST_SUCCEEDED; 73 74 if (event_open.IsValid() && !event_create.IsValid() || 75 !event_open.IsValid() && event_create.IsValid()) 76 return SBOX_TEST_FAILED; 77 } else { 78 // Only event_create has to be valid. 79 if (event_create.Get()) 80 return SBOX_TEST_SUCCEEDED; 81 } 82 83 if (ERROR_ACCESS_DENIED == error_create || 84 ERROR_BAD_PATHNAME == error_create) 85 return SBOX_TEST_DENIED; 86 87 return SBOX_TEST_FAILED; 88 } 89 90 // Tests the creation of events using all the possible combinations. 91 TEST(SyncPolicyTest, DISABLED_TestEvent) { 92 TestRunner runner; 93 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 94 TargetPolicy::EVENTS_ALLOW_ANY, 95 L"test1")); 96 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 97 TargetPolicy::EVENTS_ALLOW_ANY, 98 L"test2")); 99 100 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); 101 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); 102 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t")); 103 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t")); 104 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f test1")); 105 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f test2")); 106 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f t test1")); 107 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t t test2")); 108 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test3")); 109 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test4")); 110 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test3")); 111 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test4")); 112 } 113 114 // Tests opening events with read only access. 115 TEST(SyncPolicyTest, DISABLED_TestEventReadOnly) { 116 TestRunner runner; 117 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 118 TargetPolicy::EVENTS_ALLOW_READONLY, 119 L"test1")); 120 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 121 TargetPolicy::EVENTS_ALLOW_READONLY, 122 L"test2")); 123 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 124 TargetPolicy::EVENTS_ALLOW_READONLY, 125 L"test5")); 126 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_SYNC, 127 TargetPolicy::EVENTS_ALLOW_READONLY, 128 L"test6")); 129 130 base::win::ScopedHandle handle1(::CreateEvent(NULL, FALSE, FALSE, L"test1")); 131 base::win::ScopedHandle handle2(::CreateEvent(NULL, FALSE, FALSE, L"test2")); 132 base::win::ScopedHandle handle3(::CreateEvent(NULL, FALSE, FALSE, L"test3")); 133 base::win::ScopedHandle handle4(::CreateEvent(NULL, FALSE, FALSE, L"test4")); 134 135 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen f f")); 136 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_CreateOpen t f")); 137 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test1")); 138 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"Event_Open s test2")); 139 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open f test3")); 140 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_Open s test4")); 141 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f f test5")); 142 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t f test6")); 143 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen f t test5")); 144 EXPECT_EQ(SBOX_TEST_DENIED, runner.RunTest(L"Event_CreateOpen t t test6")); 145 } 146 147 } // namespace sandbox 148