OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/win/scoped_process_information.h" | |
6 #include "base/win/windows_version.h" | |
7 #include "sandbox/src/sandbox.h" | |
8 #include "sandbox/src/sandbox_factory.h" | |
9 #include "sandbox/src/sandbox_utils.h" | |
10 #include "sandbox/src/target_services.h" | |
11 #include "sandbox/tests/common/controller.h" | |
12 #include "testing/gtest/include/gtest/gtest.h" | |
13 | |
14 namespace sandbox { | |
15 | |
16 #define BINDNTDLL(name) \ | |
17 name ## Function name = reinterpret_cast<name ## Function>( \ | |
18 ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), #name)) | |
19 | |
20 // Reverts to self and verify that SetInformationToken was faked. Returns | |
21 // SBOX_TEST_SUCCEEDED if faked and SBOX_TEST_FAILED if not faked. | |
22 SBOX_TESTS_COMMAND int PolicyTargetTest_token(int argc, wchar_t **argv) { | |
23 HANDLE thread_token; | |
24 // Get the thread token, using impersonation. | |
25 if (!::OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE | | |
26 TOKEN_DUPLICATE, FALSE, &thread_token)) | |
27 return ::GetLastError(); | |
28 | |
29 ::RevertToSelf(); | |
30 ::CloseHandle(thread_token); | |
31 | |
32 int ret = SBOX_TEST_FAILED; | |
33 if (::OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE | TOKEN_DUPLICATE, | |
34 FALSE, &thread_token)) { | |
35 ret = SBOX_TEST_SUCCEEDED; | |
36 ::CloseHandle(thread_token); | |
37 } | |
38 return ret; | |
39 } | |
40 | |
41 // Stores the high privilege token on a static variable, change impersonation | |
42 // again to that one and verify that we are not interfering anymore with | |
43 // RevertToSelf. | |
44 SBOX_TESTS_COMMAND int PolicyTargetTest_steal(int argc, wchar_t **argv) { | |
45 static HANDLE thread_token; | |
46 if (!SandboxFactory::GetTargetServices()->GetState()->RevertedToSelf()) { | |
47 if (!::OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE | | |
48 TOKEN_DUPLICATE, FALSE, &thread_token)) | |
49 return ::GetLastError(); | |
50 } else { | |
51 if (!::SetThreadToken(NULL, thread_token)) | |
52 return ::GetLastError(); | |
53 | |
54 // See if we fake the call again. | |
55 int ret = PolicyTargetTest_token(argc, argv); | |
56 ::CloseHandle(thread_token); | |
57 return ret; | |
58 } | |
59 return 0; | |
60 } | |
61 | |
62 // Opens the thread token with and without impersonation. | |
63 SBOX_TESTS_COMMAND int PolicyTargetTest_token2(int argc, wchar_t **argv) { | |
64 HANDLE thread_token; | |
65 // Get the thread token, using impersonation. | |
66 if (!::OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE | | |
67 TOKEN_DUPLICATE, FALSE, &thread_token)) | |
68 return ::GetLastError(); | |
69 ::CloseHandle(thread_token); | |
70 | |
71 // Get the thread token, without impersonation. | |
72 if (!OpenThreadToken(GetCurrentThread(), TOKEN_IMPERSONATE | TOKEN_DUPLICATE, | |
73 TRUE, &thread_token)) | |
74 return ::GetLastError(); | |
75 ::CloseHandle(thread_token); | |
76 return SBOX_TEST_SUCCEEDED; | |
77 } | |
78 | |
79 // Opens the thread token with and without impersonation, using | |
80 // NtOpenThreadTokenEX. | |
81 SBOX_TESTS_COMMAND int PolicyTargetTest_token3(int argc, wchar_t **argv) { | |
82 BINDNTDLL(NtOpenThreadTokenEx); | |
83 if (!NtOpenThreadTokenEx) | |
84 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | |
85 | |
86 HANDLE thread_token; | |
87 // Get the thread token, using impersonation. | |
88 NTSTATUS status = NtOpenThreadTokenEx(GetCurrentThread(), | |
89 TOKEN_IMPERSONATE | TOKEN_DUPLICATE, | |
90 FALSE, 0, &thread_token); | |
91 if (status == STATUS_NO_TOKEN) | |
92 return ERROR_NO_TOKEN; | |
93 if (!NT_SUCCESS(status)) | |
94 return SBOX_TEST_FAILED; | |
95 | |
96 ::CloseHandle(thread_token); | |
97 | |
98 // Get the thread token, without impersonation. | |
99 status = NtOpenThreadTokenEx(GetCurrentThread(), | |
100 TOKEN_IMPERSONATE | TOKEN_DUPLICATE, TRUE, 0, | |
101 &thread_token); | |
102 if (!NT_SUCCESS(status)) | |
103 return SBOX_TEST_FAILED; | |
104 | |
105 ::CloseHandle(thread_token); | |
106 return SBOX_TEST_SUCCEEDED; | |
107 } | |
108 | |
109 // Tests that we can open the current thread. | |
110 SBOX_TESTS_COMMAND int PolicyTargetTest_thread(int argc, wchar_t **argv) { | |
111 DWORD thread_id = ::GetCurrentThreadId(); | |
112 HANDLE thread = ::OpenThread(SYNCHRONIZE, FALSE, thread_id); | |
113 if (!thread) | |
114 return ::GetLastError(); | |
115 if (!::CloseHandle(thread)) | |
116 return ::GetLastError(); | |
117 | |
118 return SBOX_TEST_SUCCEEDED; | |
119 } | |
120 | |
121 // New thread entry point: do nothing. | |
122 DWORD WINAPI PolicyTargetTest_thread_main(void* param) { | |
123 ::Sleep(INFINITE); | |
124 return 0; | |
125 } | |
126 | |
127 // Tests that we can create a new thread, and open it. | |
128 SBOX_TESTS_COMMAND int PolicyTargetTest_thread2(int argc, wchar_t **argv) { | |
129 // Use default values to create a new thread. | |
130 DWORD thread_id; | |
131 HANDLE thread = ::CreateThread(NULL, 0, &PolicyTargetTest_thread_main, 0, 0, | |
132 &thread_id); | |
133 if (!thread) | |
134 return ::GetLastError(); | |
135 if (!::CloseHandle(thread)) | |
136 return ::GetLastError(); | |
137 | |
138 thread = ::OpenThread(SYNCHRONIZE, FALSE, thread_id); | |
139 if (!thread) | |
140 return ::GetLastError(); | |
141 | |
142 if (!::CloseHandle(thread)) | |
143 return ::GetLastError(); | |
144 | |
145 return SBOX_TEST_SUCCEEDED; | |
146 } | |
147 | |
148 // Tests that we can call CreateProcess. | |
149 SBOX_TESTS_COMMAND int PolicyTargetTest_process(int argc, wchar_t **argv) { | |
150 // Use default values to create a new process. | |
151 STARTUPINFO startup_info = {0}; | |
152 startup_info.cb = sizeof(startup_info); | |
153 base::win::ScopedProcessInformation process_info; | |
154 if (!::CreateProcessW(L"foo.exe", L"foo.exe", NULL, NULL, FALSE, 0, | |
155 NULL, NULL, &startup_info, process_info.Receive())) | |
156 return SBOX_TEST_SUCCEEDED; | |
157 return SBOX_TEST_FAILED; | |
158 } | |
159 | |
160 TEST(PolicyTargetTest, SetInformationThread) { | |
161 TestRunner runner; | |
162 if (base::win::GetVersion() >= base::win::VERSION_XP) { | |
163 runner.SetTestState(BEFORE_REVERT); | |
164 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_token")); | |
165 } | |
166 | |
167 runner.SetTestState(AFTER_REVERT); | |
168 EXPECT_EQ(ERROR_NO_TOKEN, runner.RunTest(L"PolicyTargetTest_token")); | |
169 | |
170 runner.SetTestState(EVERY_STATE); | |
171 if (base::win::GetVersion() >= base::win::VERSION_XP) | |
172 EXPECT_EQ(SBOX_TEST_FAILED, runner.RunTest(L"PolicyTargetTest_steal")); | |
173 } | |
174 | |
175 TEST(PolicyTargetTest, OpenThreadToken) { | |
176 TestRunner runner; | |
177 if (base::win::GetVersion() >= base::win::VERSION_XP) { | |
178 runner.SetTestState(BEFORE_REVERT); | |
179 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_token2")); | |
180 } | |
181 | |
182 runner.SetTestState(AFTER_REVERT); | |
183 EXPECT_EQ(ERROR_NO_TOKEN, runner.RunTest(L"PolicyTargetTest_token2")); | |
184 } | |
185 | |
186 TEST(PolicyTargetTest, OpenThreadTokenEx) { | |
187 TestRunner runner; | |
188 if (base::win::GetVersion() < base::win::VERSION_XP) | |
189 return; | |
190 | |
191 runner.SetTestState(BEFORE_REVERT); | |
192 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_token3")); | |
193 | |
194 runner.SetTestState(AFTER_REVERT); | |
195 EXPECT_EQ(ERROR_NO_TOKEN, runner.RunTest(L"PolicyTargetTest_token3")); | |
196 } | |
197 | |
198 TEST(PolicyTargetTest, OpenThread) { | |
199 TestRunner runner; | |
200 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_thread")) << | |
201 "Opens the current thread"; | |
202 | |
203 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_thread2")) << | |
204 "Creates a new thread and opens it"; | |
205 } | |
206 | |
207 TEST(PolicyTargetTest, OpenProcess) { | |
208 TestRunner runner; | |
209 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"PolicyTargetTest_process")) << | |
210 "Opens a process"; | |
211 } | |
212 | |
213 // Launches the app in the sandbox and ask it to wait in an | |
214 // infinite loop. Waits for 2 seconds and then check if the | |
215 // desktop associated with the app thread is not the same as the | |
216 // current desktop. | |
217 TEST(PolicyTargetTest, DesktopPolicy) { | |
218 BrokerServices* broker = GetBroker(); | |
219 | |
220 // Precreate the desktop. | |
221 TargetPolicy* temp_policy = broker->CreatePolicy(); | |
222 temp_policy->CreateAlternateDesktop(false); | |
223 temp_policy->Release(); | |
224 | |
225 ASSERT_TRUE(broker != NULL); | |
226 | |
227 // Get the path to the sandboxed app. | |
228 wchar_t prog_name[MAX_PATH]; | |
229 GetModuleFileNameW(NULL, prog_name, MAX_PATH); | |
230 | |
231 std::wstring arguments(L"\""); | |
232 arguments += prog_name; | |
233 arguments += L"\" -child 0 wait"; // Don't care about the "state" argument. | |
234 | |
235 // Launch the app. | |
236 ResultCode result = SBOX_ALL_OK; | |
237 base::win::ScopedProcessInformation target; | |
238 | |
239 TargetPolicy* policy = broker->CreatePolicy(); | |
240 policy->SetAlternateDesktop(false); | |
241 policy->SetTokenLevel(USER_INTERACTIVE, USER_LOCKDOWN); | |
242 result = broker->SpawnTarget(prog_name, arguments.c_str(), policy, | |
243 target.Receive()); | |
244 policy->Release(); | |
245 | |
246 EXPECT_EQ(SBOX_ALL_OK, result); | |
247 | |
248 EXPECT_EQ(1, ::ResumeThread(target.thread_handle())); | |
249 | |
250 EXPECT_EQ(WAIT_TIMEOUT, ::WaitForSingleObject(target.process_handle(), 2000)); | |
251 | |
252 EXPECT_NE(::GetThreadDesktop(target.thread_id()), | |
253 ::GetThreadDesktop(::GetCurrentThreadId())); | |
254 | |
255 std::wstring desktop_name = policy->GetAlternateDesktop(); | |
256 HDESK desk = ::OpenDesktop(desktop_name.c_str(), 0, FALSE, DESKTOP_ENUMERATE); | |
257 EXPECT_TRUE(NULL != desk); | |
258 EXPECT_TRUE(::CloseDesktop(desk)); | |
259 EXPECT_TRUE(::TerminateProcess(target.process_handle(), 0)); | |
260 | |
261 ::WaitForSingleObject(target.process_handle(), INFINITE); | |
262 | |
263 // Close the desktop handle. | |
264 temp_policy = broker->CreatePolicy(); | |
265 temp_policy->DestroyAlternateDesktop(); | |
266 temp_policy->Release(); | |
267 | |
268 // Make sure the desktop does not exist anymore. | |
269 desk = ::OpenDesktop(desktop_name.c_str(), 0, FALSE, DESKTOP_ENUMERATE); | |
270 EXPECT_TRUE(NULL == desk); | |
271 } | |
272 | |
273 // Launches the app in the sandbox and ask it to wait in an | |
274 // infinite loop. Waits for 2 seconds and then check if the | |
275 // winstation associated with the app thread is not the same as the | |
276 // current desktop. | |
277 TEST(PolicyTargetTest, WinstaPolicy) { | |
278 BrokerServices* broker = GetBroker(); | |
279 | |
280 // Precreate the desktop. | |
281 TargetPolicy* temp_policy = broker->CreatePolicy(); | |
282 temp_policy->CreateAlternateDesktop(true); | |
283 temp_policy->Release(); | |
284 | |
285 ASSERT_TRUE(broker != NULL); | |
286 | |
287 // Get the path to the sandboxed app. | |
288 wchar_t prog_name[MAX_PATH]; | |
289 GetModuleFileNameW(NULL, prog_name, MAX_PATH); | |
290 | |
291 std::wstring arguments(L"\""); | |
292 arguments += prog_name; | |
293 arguments += L"\" -child 0 wait"; // Don't care about the "state" argument. | |
294 | |
295 // Launch the app. | |
296 ResultCode result = SBOX_ALL_OK; | |
297 base::win::ScopedProcessInformation target; | |
298 | |
299 TargetPolicy* policy = broker->CreatePolicy(); | |
300 policy->SetAlternateDesktop(true); | |
301 policy->SetTokenLevel(USER_INTERACTIVE, USER_LOCKDOWN); | |
302 result = broker->SpawnTarget(prog_name, arguments.c_str(), policy, | |
303 target.Receive()); | |
304 policy->Release(); | |
305 | |
306 EXPECT_EQ(SBOX_ALL_OK, result); | |
307 | |
308 EXPECT_EQ(1, ::ResumeThread(target.thread_handle())); | |
309 | |
310 EXPECT_EQ(WAIT_TIMEOUT, ::WaitForSingleObject(target.process_handle(), 2000)); | |
311 | |
312 EXPECT_NE(::GetThreadDesktop(target.thread_id()), | |
313 ::GetThreadDesktop(::GetCurrentThreadId())); | |
314 | |
315 std::wstring desktop_name = policy->GetAlternateDesktop(); | |
316 ASSERT_FALSE(desktop_name.empty()); | |
317 | |
318 // Make sure there is a backslash, for the window station name. | |
319 EXPECT_NE(desktop_name.find_first_of(L'\\'), std::wstring::npos); | |
320 | |
321 // Isolate the desktop name. | |
322 desktop_name = desktop_name.substr(desktop_name.find_first_of(L'\\') + 1); | |
323 | |
324 HDESK desk = ::OpenDesktop(desktop_name.c_str(), 0, FALSE, DESKTOP_ENUMERATE); | |
325 // This should fail if the desktop is really on another window station. | |
326 EXPECT_FALSE(NULL != desk); | |
327 EXPECT_TRUE(::TerminateProcess(target.process_handle(), 0)); | |
328 | |
329 ::WaitForSingleObject(target.process_handle(), INFINITE); | |
330 | |
331 // Close the desktop handle. | |
332 temp_policy = broker->CreatePolicy(); | |
333 temp_policy->DestroyAlternateDesktop(); | |
334 temp_policy->Release(); | |
335 } | |
336 | |
337 } // namespace sandbox | |
OLD | NEW |