| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/win/tests/common/controller.h" | 5 #include "sandbox/win/tests/common/controller.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 | 8 |
| 9 #include "base/process/process.h" | 9 #include "base/process/process.h" |
| 10 #include "base/strings/sys_string_conversions.h" | 10 #include "base/strings/sys_string_conversions.h" |
| 11 #include "base/win/windows_version.h" | 11 #include "base/win/windows_version.h" |
| 12 #include "sandbox/win/src/sandbox_factory.h" | 12 #include "sandbox/win/src/sandbox_factory.h" |
| 13 | 13 |
| 14 namespace { | 14 namespace { |
| 15 | 15 |
| 16 static const int kDefaultTimeout = 60000; | 16 static const int kDefaultTimeout = 60000; |
| 17 | 17 |
| 18 // Constructs a full path to a file inside the system32 folder. | 18 // Constructs a full path to a file inside the system32 folder. |
| 19 std::wstring MakePathToSys32(const wchar_t* name, bool is_obj_man_path) { | 19 base::string16 MakePathToSys32(const wchar_t* name, bool is_obj_man_path) { |
| 20 wchar_t windows_path[MAX_PATH] = {0}; | 20 wchar_t windows_path[MAX_PATH] = {0}; |
| 21 if (0 == ::GetSystemWindowsDirectoryW(windows_path, MAX_PATH)) | 21 if (0 == ::GetSystemWindowsDirectoryW(windows_path, MAX_PATH)) |
| 22 return std::wstring(); | 22 return base::string16(); |
| 23 | 23 |
| 24 std::wstring full_path(windows_path); | 24 base::string16 full_path(windows_path); |
| 25 if (full_path.empty()) | 25 if (full_path.empty()) |
| 26 return full_path; | 26 return full_path; |
| 27 | 27 |
| 28 if (is_obj_man_path) | 28 if (is_obj_man_path) |
| 29 full_path.insert(0, L"\\??\\"); | 29 full_path.insert(0, L"\\??\\"); |
| 30 | 30 |
| 31 full_path += L"\\system32\\"; | 31 full_path += L"\\system32\\"; |
| 32 full_path += name; | 32 full_path += name; |
| 33 return full_path; | 33 return full_path; |
| 34 } | 34 } |
| 35 | 35 |
| 36 // Constructs a full path to a file inside the syswow64 folder. | 36 // Constructs a full path to a file inside the syswow64 folder. |
| 37 std::wstring MakePathToSysWow64(const wchar_t* name, bool is_obj_man_path) { | 37 base::string16 MakePathToSysWow64(const wchar_t* name, bool is_obj_man_path) { |
| 38 wchar_t windows_path[MAX_PATH] = {0}; | 38 wchar_t windows_path[MAX_PATH] = {0}; |
| 39 if (0 == ::GetSystemWindowsDirectoryW(windows_path, MAX_PATH)) | 39 if (0 == ::GetSystemWindowsDirectoryW(windows_path, MAX_PATH)) |
| 40 return std::wstring(); | 40 return base::string16(); |
| 41 | 41 |
| 42 std::wstring full_path(windows_path); | 42 base::string16 full_path(windows_path); |
| 43 if (full_path.empty()) | 43 if (full_path.empty()) |
| 44 return full_path; | 44 return full_path; |
| 45 | 45 |
| 46 if (is_obj_man_path) | 46 if (is_obj_man_path) |
| 47 full_path.insert(0, L"\\??\\"); | 47 full_path.insert(0, L"\\??\\"); |
| 48 | 48 |
| 49 full_path += L"\\SysWOW64\\"; | 49 full_path += L"\\SysWOW64\\"; |
| 50 full_path += name; | 50 full_path += name; |
| 51 return full_path; | 51 return full_path; |
| 52 } | 52 } |
| 53 | 53 |
| 54 bool IsProcessRunning(HANDLE process) { | 54 bool IsProcessRunning(HANDLE process) { |
| 55 DWORD exit_code = 0; | 55 DWORD exit_code = 0; |
| 56 if (::GetExitCodeProcess(process, &exit_code)) | 56 if (::GetExitCodeProcess(process, &exit_code)) |
| 57 return exit_code == STILL_ACTIVE; | 57 return exit_code == STILL_ACTIVE; |
| 58 return false; | 58 return false; |
| 59 } | 59 } |
| 60 | 60 |
| 61 } // namespace | 61 } // namespace |
| 62 | 62 |
| 63 namespace sandbox { | 63 namespace sandbox { |
| 64 | 64 |
| 65 std::wstring MakePathToSys(const wchar_t* name, bool is_obj_man_path) { | 65 base::string16 MakePathToSys(const wchar_t* name, bool is_obj_man_path) { |
| 66 return (base::win::OSInfo::GetInstance()->wow64_status() == | 66 return (base::win::OSInfo::GetInstance()->wow64_status() == |
| 67 base::win::OSInfo::WOW64_ENABLED) ? | 67 base::win::OSInfo::WOW64_ENABLED) ? |
| 68 MakePathToSysWow64(name, is_obj_man_path) : | 68 MakePathToSysWow64(name, is_obj_man_path) : |
| 69 MakePathToSys32(name, is_obj_man_path); | 69 MakePathToSys32(name, is_obj_man_path); |
| 70 } | 70 } |
| 71 | 71 |
| 72 BrokerServices* GetBroker() { | 72 BrokerServices* GetBroker() { |
| 73 static BrokerServices* broker = SandboxFactory::GetBrokerServices(); | 73 static BrokerServices* broker = SandboxFactory::GetBrokerServices(); |
| 74 static bool is_initialized = false; | 74 static bool is_initialized = false; |
| 75 | 75 |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 143 return false; | 143 return false; |
| 144 | 144 |
| 145 return (SBOX_ALL_OK == policy_->AddRule(subsystem, semantics, pattern)); | 145 return (SBOX_ALL_OK == policy_->AddRule(subsystem, semantics, pattern)); |
| 146 } | 146 } |
| 147 | 147 |
| 148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics, | 148 bool TestRunner::AddRuleSys32(TargetPolicy::Semantics semantics, |
| 149 const wchar_t* pattern) { | 149 const wchar_t* pattern) { |
| 150 if (!is_init_) | 150 if (!is_init_) |
| 151 return false; | 151 return false; |
| 152 | 152 |
| 153 std::wstring win32_path = MakePathToSys32(pattern, false); | 153 base::string16 win32_path = MakePathToSys32(pattern, false); |
| 154 if (win32_path.empty()) | 154 if (win32_path.empty()) |
| 155 return false; | 155 return false; |
| 156 | 156 |
| 157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str())) | 157 if (!AddRule(TargetPolicy::SUBSYS_FILES, semantics, win32_path.c_str())) |
| 158 return false; | 158 return false; |
| 159 | 159 |
| 160 if (base::win::OSInfo::GetInstance()->wow64_status() != | 160 if (base::win::OSInfo::GetInstance()->wow64_status() != |
| 161 base::win::OSInfo::WOW64_ENABLED) | 161 base::win::OSInfo::WOW64_ENABLED) |
| 162 return true; | 162 return true; |
| 163 | 163 |
| (...skipping 12 matching lines...) Expand all Loading... |
| 176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern); | 176 return AddRule(TargetPolicy::SUBSYS_FILES, semantics, pattern); |
| 177 } | 177 } |
| 178 | 178 |
| 179 int TestRunner::RunTest(const wchar_t* command) { | 179 int TestRunner::RunTest(const wchar_t* command) { |
| 180 if (MAX_STATE > 10) | 180 if (MAX_STATE > 10) |
| 181 return SBOX_TEST_INVALID_PARAMETER; | 181 return SBOX_TEST_INVALID_PARAMETER; |
| 182 | 182 |
| 183 wchar_t state_number[2]; | 183 wchar_t state_number[2]; |
| 184 state_number[0] = L'0' + state_; | 184 state_number[0] = L'0' + state_; |
| 185 state_number[1] = L'\0'; | 185 state_number[1] = L'\0'; |
| 186 std::wstring full_command(state_number); | 186 base::string16 full_command(state_number); |
| 187 full_command += L" "; | 187 full_command += L" "; |
| 188 full_command += command; | 188 full_command += command; |
| 189 | 189 |
| 190 return InternalRunTest(full_command.c_str()); | 190 return InternalRunTest(full_command.c_str()); |
| 191 } | 191 } |
| 192 | 192 |
| 193 int TestRunner::InternalRunTest(const wchar_t* command) { | 193 int TestRunner::InternalRunTest(const wchar_t* command) { |
| 194 if (!is_init_) | 194 if (!is_init_) |
| 195 return SBOX_TEST_FAILED_TO_RUN_TEST; | 195 return SBOX_TEST_FAILED_TO_RUN_TEST; |
| 196 | 196 |
| 197 // For simplicity TestRunner supports only one process per instance. | 197 // For simplicity TestRunner supports only one process per instance. |
| 198 if (target_process_) { | 198 if (target_process_) { |
| 199 if (IsProcessRunning(target_process_)) | 199 if (IsProcessRunning(target_process_)) |
| 200 return SBOX_TEST_FAILED_TO_RUN_TEST; | 200 return SBOX_TEST_FAILED_TO_RUN_TEST; |
| 201 target_process_.Close(); | 201 target_process_.Close(); |
| 202 target_process_id_ = 0; | 202 target_process_id_ = 0; |
| 203 } | 203 } |
| 204 | 204 |
| 205 // Get the path to the sandboxed process. | 205 // Get the path to the sandboxed process. |
| 206 wchar_t prog_name[MAX_PATH]; | 206 wchar_t prog_name[MAX_PATH]; |
| 207 GetModuleFileNameW(NULL, prog_name, MAX_PATH); | 207 GetModuleFileNameW(NULL, prog_name, MAX_PATH); |
| 208 | 208 |
| 209 // Launch the sandboxed process. | 209 // Launch the sandboxed process. |
| 210 ResultCode result = SBOX_ALL_OK; | 210 ResultCode result = SBOX_ALL_OK; |
| 211 PROCESS_INFORMATION target = {0}; | 211 PROCESS_INFORMATION target = {0}; |
| 212 | 212 |
| 213 std::wstring arguments(L"\""); | 213 base::string16 arguments(L"\""); |
| 214 arguments += prog_name; | 214 arguments += prog_name; |
| 215 arguments += L"\" -child"; | 215 arguments += L"\" -child"; |
| 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; | 216 arguments += no_sandbox_ ? L"-no-sandbox " : L" "; |
| 217 arguments += command; | 217 arguments += command; |
| 218 | 218 |
| 219 if (no_sandbox_) { | 219 if (no_sandbox_) { |
| 220 STARTUPINFO startup_info = {sizeof(STARTUPINFO)}; | 220 STARTUPINFO startup_info = {sizeof(STARTUPINFO)}; |
| 221 if (!::CreateProcessW(prog_name, &arguments[0], NULL, NULL, FALSE, 0, | 221 if (!::CreateProcessW(prog_name, &arguments[0], NULL, NULL, FALSE, 0, |
| 222 NULL, NULL, &startup_info, &target)) { | 222 NULL, NULL, &startup_info, &target)) { |
| 223 return SBOX_ERROR_GENERIC; | 223 return SBOX_ERROR_GENERIC; |
| (...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 327 | 327 |
| 328 target->LowerToken(); | 328 target->LowerToken(); |
| 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { | 329 } else if (0 != _wcsicmp(argv[1], L"-child-no-sandbox")) { |
| 330 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | 330 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
| 331 } | 331 } |
| 332 | 332 |
| 333 return command(argc - 4, argv + 4); | 333 return command(argc - 4, argv + 4); |
| 334 } | 334 } |
| 335 | 335 |
| 336 } // namespace sandbox | 336 } // namespace sandbox |
| OLD | NEW |