| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/stringprintf.h" | 5 #include "base/stringprintf.h" |
| 6 #include "base/win/scoped_handle.h" | 6 #include "base/win/scoped_handle.h" |
| 7 #include "sandbox/src/handle_closer_agent.h" | 7 #include "sandbox/win/src/handle_closer_agent.h" |
| 8 #include "sandbox/src/sandbox.h" | 8 #include "sandbox/win/src/sandbox.h" |
| 9 #include "sandbox/src/sandbox_factory.h" | 9 #include "sandbox/win/src/sandbox_factory.h" |
| 10 #include "sandbox/src/target_services.h" | 10 #include "sandbox/win/src/target_services.h" |
| 11 #include "sandbox/tests/common/controller.h" | 11 #include "sandbox/win/tests/common/controller.h" |
| 12 #include "testing/gtest/include/gtest/gtest.h" | 12 #include "testing/gtest/include/gtest/gtest.h" |
| 13 | 13 |
| 14 namespace { | 14 namespace { |
| 15 | 15 |
| 16 const wchar_t *kFileExtensions[] = { L".1", L".2", L".3", L".4" }; | 16 const wchar_t *kFileExtensions[] = { L".1", L".2", L".3", L".4" }; |
| 17 | 17 |
| 18 // Returns a handle to a unique marker file that can be retrieved between runs. | 18 // Returns a handle to a unique marker file that can be retrieved between runs. |
| 19 HANDLE GetMarkerFile(const wchar_t *extension) { | 19 HANDLE GetMarkerFile(const wchar_t *extension) { |
| 20 wchar_t path_buffer[MAX_PATH + 1]; | 20 wchar_t path_buffer[MAX_PATH + 1]; |
| 21 CHECK(::GetTempPath(MAX_PATH, path_buffer)); | 21 CHECK(::GetTempPath(MAX_PATH, path_buffer)); |
| (...skipping 163 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 185 runner.SetTestState(AFTER_REVERT); | 185 runner.SetTestState(AFTER_REVERT); |
| 186 sandbox::TargetPolicy* policy = runner.GetPolicy(); | 186 sandbox::TargetPolicy* policy = runner.GetPolicy(); |
| 187 | 187 |
| 188 // Sever the CSRSS connection by closing ALPC ports inside the sandbox. | 188 // Sever the CSRSS connection by closing ALPC ports inside the sandbox. |
| 189 CHECK_EQ(policy->AddKernelObjectToClose(L"ALPC Port", NULL), SBOX_ALL_OK); | 189 CHECK_EQ(policy->AddKernelObjectToClose(L"ALPC Port", NULL), SBOX_ALL_OK); |
| 190 | 190 |
| 191 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"RunThreadPool")); | 191 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"RunThreadPool")); |
| 192 } | 192 } |
| 193 | 193 |
| 194 } // namespace sandbox | 194 } // namespace sandbox |
| OLD | NEW |