| Index: sandbox/src/handle_closer_test.cc
|
| diff --git a/sandbox/src/handle_closer_test.cc b/sandbox/src/handle_closer_test.cc
|
| deleted file mode 100644
|
| index 81b6db2715cfa5a9e6f68b299cd65e21fdf5f616..0000000000000000000000000000000000000000
|
| --- a/sandbox/src/handle_closer_test.cc
|
| +++ /dev/null
|
| @@ -1,194 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "base/stringprintf.h"
|
| -#include "base/win/scoped_handle.h"
|
| -#include "sandbox/src/handle_closer_agent.h"
|
| -#include "sandbox/src/sandbox.h"
|
| -#include "sandbox/src/sandbox_factory.h"
|
| -#include "sandbox/src/target_services.h"
|
| -#include "sandbox/tests/common/controller.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -namespace {
|
| -
|
| -const wchar_t *kFileExtensions[] = { L".1", L".2", L".3", L".4" };
|
| -
|
| -// Returns a handle to a unique marker file that can be retrieved between runs.
|
| -HANDLE GetMarkerFile(const wchar_t *extension) {
|
| - wchar_t path_buffer[MAX_PATH + 1];
|
| - CHECK(::GetTempPath(MAX_PATH, path_buffer));
|
| - string16 marker_path = path_buffer;
|
| - marker_path += L"\\sbox_marker_";
|
| -
|
| - // Generate a unique value from the exe's size and timestamp.
|
| - CHECK(::GetModuleFileName(NULL, path_buffer, MAX_PATH));
|
| - base::win::ScopedHandle module(::CreateFile(path_buffer,
|
| - FILE_READ_ATTRIBUTES, FILE_SHARE_READ, NULL,
|
| - OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL));
|
| - CHECK(module.IsValid());
|
| - FILETIME timestamp;
|
| - CHECK(::GetFileTime(module, ×tamp, NULL, NULL));
|
| - marker_path += base::StringPrintf(L"%08x%08x%08x",
|
| - ::GetFileSize(module, NULL),
|
| - timestamp.dwLowDateTime,
|
| - timestamp.dwHighDateTime);
|
| - marker_path += extension;
|
| -
|
| - // Make the file delete-on-close so cleanup is automatic.
|
| - return CreateFile(marker_path.c_str(), FILE_ALL_ACCESS,
|
| - FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
|
| - NULL, OPEN_ALWAYS, FILE_FLAG_DELETE_ON_CLOSE, NULL);
|
| -}
|
| -
|
| -// Used by the thread pool tests.
|
| -HANDLE finish_event;
|
| -const int kWaitCount = 20;
|
| -
|
| -} // namespace
|
| -
|
| -namespace sandbox {
|
| -
|
| -// Checks for the presence of a list of files (in object path form).
|
| -// Format: CheckForFileHandle (Y|N) \path\to\file1 [\path\to\file2 ...]
|
| -// - Y or N depending if the file should exist or not.
|
| -SBOX_TESTS_COMMAND int CheckForFileHandles(int argc, wchar_t **argv) {
|
| - if (argc < 2)
|
| - return SBOX_TEST_FAILED_TO_RUN_TEST;
|
| - bool should_find = argv[0][0] == L'Y';
|
| - if (argv[0][1] != L'\0' || !should_find && argv[0][0] != L'N')
|
| - return SBOX_TEST_FAILED_TO_RUN_TEST;
|
| -
|
| - static int state = BEFORE_INIT;
|
| - switch (state++) {
|
| - case BEFORE_INIT:
|
| - // Create a unique marker file that is open while the test is running.
|
| - // The handles leak, but it will be closed by the test or on exit.
|
| - for (int i = 0; i < arraysize(kFileExtensions); ++i)
|
| - EXPECT_NE(GetMarkerFile(kFileExtensions[i]), INVALID_HANDLE_VALUE);
|
| - return SBOX_TEST_SUCCEEDED;
|
| -
|
| - case AFTER_REVERT: {
|
| - // Brute force the handle table to find what we're looking for.
|
| - DWORD handle_count = UINT_MAX;
|
| - const int kInvalidHandleThreshold = 100;
|
| - const size_t kHandleOffset = sizeof(HANDLE);
|
| - HANDLE handle = NULL;
|
| - int invalid_count = 0;
|
| - string16 handle_name;
|
| -
|
| - if (!::GetProcessHandleCount(::GetCurrentProcess(), &handle_count))
|
| - return SBOX_TEST_FAILED_TO_RUN_TEST;
|
| -
|
| - while (handle_count && invalid_count < kInvalidHandleThreshold) {
|
| - reinterpret_cast<size_t&>(handle) += kHandleOffset;
|
| - if (GetHandleName(handle, &handle_name)) {
|
| - for (int i = 1; i < argc; ++i) {
|
| - if (handle_name == argv[i])
|
| - return should_find ? SBOX_TEST_SUCCEEDED : SBOX_TEST_FAILED;
|
| - }
|
| - --handle_count;
|
| - } else {
|
| - ++invalid_count;
|
| - }
|
| - }
|
| -
|
| - return should_find ? SBOX_TEST_FAILED : SBOX_TEST_SUCCEEDED;
|
| - }
|
| -
|
| - default: // Do nothing.
|
| - break;
|
| - }
|
| -
|
| - return SBOX_TEST_SUCCEEDED;
|
| -}
|
| -
|
| -TEST(HandleCloserTest, CheckForMarkerFiles) {
|
| - TestRunner runner;
|
| - runner.SetTimeout(2000);
|
| - runner.SetTestState(EVERY_STATE);
|
| - sandbox::TargetPolicy* policy = runner.GetPolicy();
|
| -
|
| - string16 command = string16(L"CheckForFileHandles Y");
|
| - for (int i = 0; i < arraysize(kFileExtensions); ++i) {
|
| - string16 handle_name;
|
| - base::win::ScopedHandle marker(GetMarkerFile(kFileExtensions[i]));
|
| - CHECK(marker.IsValid());
|
| - CHECK(sandbox::GetHandleName(marker, &handle_name));
|
| - command += (L" ");
|
| - command += handle_name;
|
| - }
|
| -
|
| - EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(command.c_str())) <<
|
| - "Failed: " << command;
|
| -}
|
| -
|
| -TEST(HandleCloserTest, CloseMarkerFiles) {
|
| - TestRunner runner;
|
| - runner.SetTimeout(2000);
|
| - runner.SetTestState(EVERY_STATE);
|
| - sandbox::TargetPolicy* policy = runner.GetPolicy();
|
| -
|
| - string16 command = string16(L"CheckForFileHandles N");
|
| - for (int i = 0; i < arraysize(kFileExtensions); ++i) {
|
| - string16 handle_name;
|
| - base::win::ScopedHandle marker(GetMarkerFile(kFileExtensions[i]));
|
| - CHECK(marker.IsValid());
|
| - CHECK(sandbox::GetHandleName(marker, &handle_name));
|
| - CHECK_EQ(policy->AddKernelObjectToClose(L"File", handle_name.c_str()),
|
| - SBOX_ALL_OK);
|
| - command += (L" ");
|
| - command += handle_name;
|
| - }
|
| -
|
| - EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(command.c_str())) <<
|
| - "Failed: " << command;
|
| -}
|
| -
|
| -void WINAPI ThreadPoolTask(void* event, BOOLEAN timeout) {
|
| - static volatile LONG waiters_remaining = kWaitCount;
|
| - CHECK(!timeout);
|
| - CHECK(::CloseHandle(event));
|
| - if (::InterlockedDecrement(&waiters_remaining) == 0)
|
| - CHECK(::SetEvent(finish_event));
|
| -}
|
| -
|
| -// Run a thread pool inside a sandbox without a CSRSS connection.
|
| -SBOX_TESTS_COMMAND int RunThreadPool(int argc, wchar_t **argv) {
|
| - HANDLE wait_list[20];
|
| - CHECK(finish_event = ::CreateEvent(NULL, TRUE, FALSE, NULL));
|
| -
|
| - // Set up a bunch of waiters.
|
| - HANDLE pool = NULL;
|
| - for (int i = 0; i < kWaitCount; ++i) {
|
| - HANDLE event = ::CreateEvent(NULL, TRUE, FALSE, NULL);
|
| - CHECK(event);
|
| - CHECK(::RegisterWaitForSingleObject(&pool, event, ThreadPoolTask, event,
|
| - INFINITE, WT_EXECUTEONLYONCE));
|
| - wait_list[i] = event;
|
| - }
|
| -
|
| - // Signal all the waiters.
|
| - for (int i = 0; i < kWaitCount; ++i)
|
| - CHECK(::SetEvent(wait_list[i]));
|
| -
|
| - CHECK_EQ(::WaitForSingleObject(finish_event, INFINITE), WAIT_OBJECT_0);
|
| - CHECK(::CloseHandle(finish_event));
|
| -
|
| - return SBOX_TEST_SUCCEEDED;
|
| -}
|
| -
|
| -TEST(HandleCloserTest, RunThreadPool) {
|
| - TestRunner runner;
|
| - runner.SetTimeout(2000);
|
| - runner.SetTestState(AFTER_REVERT);
|
| - sandbox::TargetPolicy* policy = runner.GetPolicy();
|
| -
|
| - // Sever the CSRSS connection by closing ALPC ports inside the sandbox.
|
| - CHECK_EQ(policy->AddKernelObjectToClose(L"ALPC Port", NULL), SBOX_ALL_OK);
|
| -
|
| - EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"RunThreadPool"));
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|