Index: sandbox/win/src/process_mitigations_test.cc |
diff --git a/sandbox/win/src/process_mitigations_test.cc b/sandbox/win/src/process_mitigations_test.cc |
index 080d8eca3fcbd49752b9b3318e43527cc65e0add..6c829761698ab8435762161bfc77be673ca51cf9 100644 |
--- a/sandbox/win/src/process_mitigations_test.cc |
+++ b/sandbox/win/src/process_mitigations_test.cc |
@@ -2,9 +2,13 @@ |
// Use of this source code is governed by a BSD-style license that can be |
// found in the LICENSE file. |
+#include "base/files/file_util.h" |
+#include "base/files/scoped_temp_dir.h" |
+#include "base/memory/scoped_ptr.h" |
+#include "base/path_service.h" |
+#include "base/process/launch.h" |
#include "base/strings/stringprintf.h" |
#include "base/win/scoped_handle.h" |
- |
#include "base/win/windows_version.h" |
#include "sandbox/win/src/nt_internals.h" |
#include "sandbox/win/src/process_mitigations.h" |
@@ -17,19 +21,18 @@ |
namespace { |
-typedef BOOL (WINAPI *GetProcessDEPPolicyFunction)( |
- HANDLE process, |
- LPDWORD flags, |
- PBOOL permanent); |
- |
-typedef BOOL (WINAPI *GetProcessMitigationPolicyFunction)( |
- HANDLE process, |
- PROCESS_MITIGATION_POLICY mitigation_policy, |
- PVOID buffer, |
- SIZE_T length); |
+// API defined in winbase.h. |
+typedef decltype(GetProcessDEPPolicy)* GetProcessDEPPolicyFunction; |
+// API defined in processthreadsapi.h. |
+typedef decltype( |
+ GetProcessMitigationPolicy)* GetProcessMitigationPolicyFunction; |
GetProcessMitigationPolicyFunction get_process_mitigation_policy; |
+// APIs defined in wingdi.h. |
+typedef decltype(AddFontMemResourceEx)* AddFontMemResourceExFunction; |
+typedef decltype(RemoveFontMemResourceEx)* RemoveFontMemResourceExFunction; |
+ |
#if !defined(_WIN64) |
bool CheckWin8DepPolicy() { |
PROCESS_MITIGATION_DEP_POLICY policy = {}; |
@@ -83,10 +86,157 @@ bool CheckWin8DllExtensionPolicy() { |
return policy.DisableExtensionPoints; |
} |
+bool CheckWin10FontPolicy() { |
+ PROCESS_MITIGATION_FONT_DISABLE_POLICY policy = {}; |
+ if (!get_process_mitigation_policy(::GetCurrentProcess(), |
+ ProcessFontDisablePolicy, &policy, |
+ sizeof(policy))) { |
+ return false; |
+ } |
+ return policy.DisableNonSystemFonts; |
+} |
+ |
+bool CheckWin10ImageLoadNoRemotePolicy() { |
+ PROCESS_MITIGATION_IMAGE_LOAD_POLICY policy = {}; |
+ if (!get_process_mitigation_policy(::GetCurrentProcess(), |
+ ProcessImageLoadPolicy, &policy, |
+ sizeof(policy))) { |
+ return false; |
+ } |
+ return policy.NoRemoteImages; |
+} |
+ |
+void TestWin10ImageLoadRemote(bool is_success_test) { |
+ // ***Insert your manual testing share UNC path here! |
+ // E.g.: \\\\hostname\\sharename\\calc.exe |
+ std::wstring unc = L"\"\\\\hostname\\sharename\\calc.exe\""; |
+ |
+ sandbox::TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ // Set a policy that would normally allow for process creation. |
+ policy->SetJobLevel(sandbox::JOB_NONE, 0); |
+ policy->SetTokenLevel(sandbox::USER_UNPROTECTED, sandbox::USER_UNPROTECTED); |
+ runner.SetDisableCsrss(false); |
+ |
+ if (!is_success_test) { |
+ // Enable the NoRemote mitigation. |
+ EXPECT_EQ(policy->SetDelayedProcessMitigations( |
+ sandbox::MITIGATION_IMAGE_LOAD_NO_REMOTE), |
+ sandbox::SBOX_ALL_OK); |
+ } |
+ |
+ std::wstring test = L"TestChildProcess "; |
+ test += unc.c_str(); |
+ EXPECT_EQ((is_success_test ? sandbox::SBOX_TEST_SUCCEEDED |
+ : sandbox::SBOX_TEST_FAILED), |
+ runner.RunTest(test.c_str())); |
+} |
+ |
+bool CheckWin10ImageLoadNoLowLabelPolicy() { |
+ PROCESS_MITIGATION_IMAGE_LOAD_POLICY policy = {}; |
+ if (!get_process_mitigation_policy(::GetCurrentProcess(), |
+ ProcessImageLoadPolicy, &policy, |
+ sizeof(policy))) { |
+ return false; |
+ } |
+ return policy.NoLowMandatoryLabelImages; |
+} |
+ |
+void TestWin10ImageLoadLowLabel(bool is_success_test) { |
+ // Setup a mandatory low executable for this test (calc.exe). |
+ // If anything fails during setup, ASSERT to end test. |
+ base::FilePath orig_path; |
+ ASSERT_TRUE(base::PathService::Get(base::DIR_SYSTEM, &orig_path)); |
+ orig_path = orig_path.Append(L"calc.exe"); |
+ |
+ base::ScopedTempDir temp_dir; |
+ ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
+ base::FilePath new_path = temp_dir.path(); |
+ new_path = new_path.Append(L"lowIL_calc.exe"); |
+ |
+ // Test file will be cleaned up by the ScopedTempDir. |
+ ASSERT_TRUE(base::CopyFileW(orig_path, new_path)); |
+ |
+ std::wstring cmd_line = L"icacls \""; |
+ cmd_line += new_path.value().c_str(); |
+ cmd_line += L"\" /setintegritylevel Low"; |
+ |
+ base::LaunchOptions options = base::LaunchOptionsForTest(); |
+ base::Process setup_proc = base::LaunchProcess(cmd_line.c_str(), options); |
+ ASSERT_TRUE(setup_proc.IsValid()); |
+ |
+ int exit_code = 1; |
+ if (!setup_proc.WaitForExitWithTimeout(base::TimeDelta::FromSeconds(10), |
+ &exit_code)) { |
+ // Might have timed out, or might have failed. |
+ // Terminate to make sure we clean up any mess. |
+ setup_proc.Terminate(0, false); |
+ ASSERT_TRUE(false); |
+ } |
+ // Make sure icacls was successful. |
+ ASSERT_EQ(0, exit_code); |
+ |
+ sandbox::TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ // Set a policy that would normally allow for process creation. |
+ policy->SetJobLevel(sandbox::JOB_NONE, 0); |
+ policy->SetTokenLevel(sandbox::USER_UNPROTECTED, sandbox::USER_UNPROTECTED); |
+ runner.SetDisableCsrss(false); |
+ |
+ if (!is_success_test) { |
+ // Enable the NoLowLabel mitigation. |
+ EXPECT_EQ(policy->SetDelayedProcessMitigations( |
+ sandbox::MITIGATION_IMAGE_LOAD_NO_LOW_LABEL), |
+ sandbox::SBOX_ALL_OK); |
+ } |
+ |
+ std::wstring test = L"TestChildProcess "; |
+ test += new_path.value().c_str(); |
+ |
+ EXPECT_EQ((is_success_test ? sandbox::SBOX_TEST_SUCCEEDED |
+ : sandbox::SBOX_TEST_FAILED), |
+ runner.RunTest(test.c_str())); |
+} |
+ |
} // namespace |
namespace sandbox { |
+// A shared helper test command that will attempt to CreateProcess |
+// with a given command line. |
+// |
+// ***Make sure you've enabled basic process creation in the |
+// test sandbox settings via: |
+// sandbox::TargetPolicy::SetJobLevel(), |
+// sandbox::TargetPolicy::SetTokenLevel(), |
+// and TestRunner::SetDisableCsrss(). |
+SBOX_TESTS_COMMAND int TestChildProcess(int argc, wchar_t** argv) { |
+ if (argc < 1) |
+ return SBOX_TEST_INVALID_PARAMETER; |
+ |
+ std::wstring cmd = argv[0]; |
+ base::LaunchOptions options = base::LaunchOptionsForTest(); |
+ base::Process setup_proc = base::LaunchProcess(cmd.c_str(), options); |
+ |
+ if (setup_proc.IsValid()) { |
+ setup_proc.Terminate(0, false); |
+ return SBOX_TEST_SUCCEEDED; |
+ } |
+ // Note: GetLastError from CreateProcess returns 5, "ERROR_ACCESS_DENIED". |
+ return SBOX_TEST_FAILED; |
+} |
+ |
+//------------------------------------------------------------------------------ |
+// Win8 Checks: |
+// MITIGATION_DEP(_NO_ATL_THUNK) |
+// MITIGATION_EXTENSION_DLL_DISABLE |
+// MITIGATION_RELOCATE_IMAGE(_REQUIRED) - ASLR, release only |
+// MITIGATION_STRICT_HANDLE_CHECKS |
+// >= Win8 |
+//------------------------------------------------------------------------------ |
+ |
SBOX_TESTS_COMMAND int CheckWin8(int argc, wchar_t **argv) { |
get_process_mitigation_policy = |
reinterpret_cast<GetProcessMitigationPolicyFunction>( |
@@ -138,6 +288,10 @@ TEST(ProcessMitigationsTest, CheckWin8) { |
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckWin8")); |
} |
+//------------------------------------------------------------------------------ |
+// DEP (MITIGATION_DEP) |
+// < Win8 x86 |
+//------------------------------------------------------------------------------ |
SBOX_TESTS_COMMAND int CheckDep(int argc, wchar_t **argv) { |
GetProcessDEPPolicyFunction get_process_dep_policy = |
@@ -201,6 +355,11 @@ TEST(ProcessMitigationsTest, CheckDep) { |
} |
#endif |
+//------------------------------------------------------------------------------ |
+// Win32k Lockdown (MITIGATION_WIN32K_DISABLE) |
+// >= Win8 |
+//------------------------------------------------------------------------------ |
+ |
SBOX_TESTS_COMMAND int CheckWin8Lockdown(int argc, wchar_t **argv) { |
get_process_mitigation_policy = |
reinterpret_cast<GetProcessMitigationPolicyFunction>( |
@@ -248,5 +407,297 @@ TEST(ProcessMitigationsTest, CheckWin8Win32KLockDownSuccess) { |
EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckWin8Lockdown")); |
} |
+//------------------------------------------------------------------------------ |
+// Disable non-system font loads (MITIGATION_NONSYSTEM_FONT_DISABLE) |
+// >= Win10 |
+//------------------------------------------------------------------------------ |
+ |
+SBOX_TESTS_COMMAND int CheckWin10FontLockDown(int argc, wchar_t** argv) { |
+ get_process_mitigation_policy = |
+ reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress( |
+ ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy")); |
+ if (!get_process_mitigation_policy) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ if (!CheckWin10FontPolicy()) |
+ return SBOX_TEST_FIRST_ERROR; |
+ return SBOX_TEST_SUCCEEDED; |
+} |
+ |
+SBOX_TESTS_COMMAND int CheckWin10FontLoad(int argc, wchar_t** argv) { |
+ if (argc < 1) |
+ return SBOX_TEST_INVALID_PARAMETER; |
+ |
+ HMODULE gdi_module = ::LoadLibraryW(L"gdi32.dll"); |
+ if (!gdi_module) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ AddFontMemResourceExFunction add_font_mem_resource = |
+ reinterpret_cast<AddFontMemResourceExFunction>( |
+ ::GetProcAddress(gdi_module, "AddFontMemResourceEx")); |
+ |
+ RemoveFontMemResourceExFunction rem_font_mem_resource = |
+ reinterpret_cast<RemoveFontMemResourceExFunction>( |
+ ::GetProcAddress(gdi_module, "RemoveFontMemResourceEx")); |
+ |
+ if (!add_font_mem_resource || !rem_font_mem_resource) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ // Open font file passed in as an argument. |
+ base::File file(base::FilePath(argv[0]), |
+ base::File::FLAG_OPEN | base::File::FLAG_READ); |
+ if (!file.IsValid()) |
+ // Failed to open the font file passed in. |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ std::vector<char> font_data; |
+ int64_t len = file.GetLength(); |
+ font_data.resize(len); |
+ |
+ int read = file.Read(0, &font_data[0], len); |
+ file.Close(); |
+ |
+ if (read != len) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ DWORD font_count = 0; |
+ HANDLE font_handle = add_font_mem_resource( |
+ &font_data[0], static_cast<DWORD>(font_data.size()), NULL, &font_count); |
+ |
+ if (font_handle) { |
+ rem_font_mem_resource(font_handle); |
+ return SBOX_TEST_SUCCEEDED; |
+ } |
+ |
+ return SBOX_TEST_FAILED; |
+} |
+ |
+// This test validates that setting the MITIGATION_NON_SYSTEM_FONTS_DISABLE |
+// mitigation enables the setting on a process. |
+TEST(ProcessMitigationsTest, CheckWin10NonSystemFontLockDownPolicySuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10) |
+ return; |
+ |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_NONSYSTEM_FONT_DISABLE), |
+ SBOX_ALL_OK); |
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckWin10FontLockDown")); |
+} |
+ |
+// This test validates that we can load a non-system font |
+// if the MITIGATION_NON_SYSTEM_FONTS_DISABLE |
+// mitigation is NOT set. |
+TEST(ProcessMitigationsTest, CheckWin10NonSystemFontLockDownLoadSuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10) |
+ return; |
+ |
+ base::FilePath font_path; |
+ EXPECT_TRUE(base::PathService::Get(base::DIR_WINDOWS_FONTS, &font_path)); |
+ // Arial font should always be available |
+ font_path = font_path.Append(L"arial.ttf"); |
+ |
+ TestRunner runner; |
+ EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, |
+ font_path.value().c_str())); |
+ |
+ std::wstring test_command = L"CheckWin10FontLoad \""; |
+ test_command += font_path.value().c_str(); |
+ test_command += L"\""; |
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(test_command.c_str())); |
+} |
+ |
+// This test validates that setting the MITIGATION_NON_SYSTEM_FONTS_DISABLE |
+// mitigation prevents the loading of a non-system font. |
+TEST(ProcessMitigationsTest, CheckWin10NonSystemFontLockDownLoadFailure) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10) |
+ return; |
+ |
+ base::FilePath font_path; |
+ EXPECT_TRUE(base::PathService::Get(base::DIR_WINDOWS_FONTS, &font_path)); |
+ // Arial font should always be available |
+ font_path = font_path.Append(L"arial.ttf"); |
+ |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ EXPECT_TRUE(runner.AddFsRule(TargetPolicy::FILES_ALLOW_READONLY, |
+ font_path.value().c_str())); |
+ |
+ // Turn on the non-system font disable mitigation. |
+ EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_NONSYSTEM_FONT_DISABLE), |
+ SBOX_ALL_OK); |
+ |
+ std::wstring test_command = L"CheckWin10FontLoad \""; |
+ test_command += font_path.value().c_str(); |
+ test_command += L"\""; |
+ |
+ EXPECT_EQ(SBOX_TEST_FAILED, runner.RunTest(test_command.c_str())); |
+} |
+ |
+//------------------------------------------------------------------------------ |
+// Disable image load from remote devices (MITIGATION_IMAGE_LOAD_NO_REMOTE). |
+// >= Win10_TH2 |
+//------------------------------------------------------------------------------ |
+ |
+SBOX_TESTS_COMMAND int CheckWin10ImageLoadNoRemote(int argc, wchar_t** argv) { |
+ get_process_mitigation_policy = |
+ reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress( |
+ ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy")); |
+ if (!get_process_mitigation_policy) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ if (!CheckWin10ImageLoadNoRemotePolicy()) |
+ return SBOX_TEST_FIRST_ERROR; |
+ return SBOX_TEST_SUCCEEDED; |
+} |
+ |
+// This test validates that setting the MITIGATION_IMAGE_LOAD_NO_REMOTE |
+// mitigation enables the setting on a process. |
+TEST(ProcessMitigationsTest, CheckWin10ImageLoadNoRemotePolicySuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ EXPECT_EQ( |
+ policy->SetDelayedProcessMitigations(MITIGATION_IMAGE_LOAD_NO_REMOTE), |
+ SBOX_ALL_OK); |
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, |
+ runner.RunTest(L"CheckWin10ImageLoadNoRemote")); |
+} |
+ |
+// This test validates that we CAN create a new process from |
+// a remote UNC device, if the MITIGATION_IMAGE_LOAD_NO_REMOTE |
+// mitigation is NOT set. |
+// |
+// DISABLED for automated testing bots. Enable for manual testing. |
+TEST(ProcessMitigationsTest, DISABLED_CheckWin10ImageLoadNoRemoteSuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestWin10ImageLoadRemote(true); |
+} |
+ |
+// This test validates that setting the MITIGATION_IMAGE_LOAD_NO_REMOTE |
+// mitigation prevents creating a new process from a remote |
+// UNC device. |
+// |
+// DISABLED for automated testing bots. Enable for manual testing. |
+TEST(ProcessMitigationsTest, DISABLED_CheckWin10ImageLoadNoRemoteFailure) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestWin10ImageLoadRemote(false); |
+} |
+ |
+//------------------------------------------------------------------------------ |
+// Disable image load when "mandatory low label" (integrity level). |
+// (MITIGATION_IMAGE_LOAD_NO_LOW_LABEL) |
+// >= Win10_TH2 |
+//------------------------------------------------------------------------------ |
+ |
+SBOX_TESTS_COMMAND int CheckWin10ImageLoadNoLowLabel(int argc, wchar_t** argv) { |
+ get_process_mitigation_policy = |
+ reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress( |
+ ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy")); |
+ if (!get_process_mitigation_policy) |
+ return SBOX_TEST_NOT_FOUND; |
+ |
+ if (!CheckWin10ImageLoadNoLowLabelPolicy()) |
+ return SBOX_TEST_FIRST_ERROR; |
+ return SBOX_TEST_SUCCEEDED; |
+} |
+ |
+// This test validates that setting the MITIGATION_IMAGE_LOAD_NO_LOW_LABEL |
+// mitigation enables the setting on a process. |
+TEST(ProcessMitigationsTest, CheckWin10ImageLoadNoLowLabelPolicySuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ EXPECT_EQ( |
+ policy->SetDelayedProcessMitigations(MITIGATION_IMAGE_LOAD_NO_LOW_LABEL), |
+ SBOX_ALL_OK); |
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, |
+ runner.RunTest(L"CheckWin10ImageLoadNoLowLabel")); |
+} |
+ |
+// This test validates that we CAN create a new process with |
+// low mandatory label (IL), if the MITIGATION_IMAGE_LOAD_NO_LOW_LABEL |
+// mitigation is NOT set. |
+TEST(ProcessMitigationsTest, CheckWin10ImageLoadNoLowLabelSuccess) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestWin10ImageLoadLowLabel(true); |
+} |
+ |
+// This test validates that setting the MITIGATION_IMAGE_LOAD_NO_LOW_LABEL |
+// mitigation prevents creating a new process with low mandatory label (IL). |
+TEST(ProcessMitigationsTest, CheckWin10ImageLoadNoLowLabelFailure) { |
+ if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2) |
+ return; |
+ |
+ TestWin10ImageLoadLowLabel(false); |
+} |
+ |
+//------------------------------------------------------------------------------ |
+// Disable child process creation. |
+// - JobLevel <= JOB_LIMITED_USER (on < WIN10_TH2). |
+// - JobLevel <= JOB_LIMITED_USER which also triggers setting |
+// PROC_THREAD_ATTRIBUTE_CHILD_PROCESS_POLICY to |
+// PROCESS_CREATION_CHILD_PROCESS_RESTRICTED in |
+// BrokerServicesBase::SpawnTarget (on >= WIN10_TH2). |
+//------------------------------------------------------------------------------ |
+ |
+// This test validates that we can spawn a child process if |
+// MITIGATION_CHILD_PROCESS_CREATION_RESTRICTED mitigation is |
+// not set. |
+TEST(ProcessMitigationsTest, CheckChildProcessSuccess) { |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ // Set a policy that would normally allow for process creation. |
+ policy->SetJobLevel(JOB_INTERACTIVE, 0); |
+ policy->SetTokenLevel(USER_UNPROTECTED, USER_UNPROTECTED); |
+ runner.SetDisableCsrss(false); |
+ |
+ base::FilePath cmd; |
+ EXPECT_TRUE(base::PathService::Get(base::DIR_SYSTEM, &cmd)); |
+ cmd = cmd.Append(L"calc.exe"); |
+ |
+ std::wstring test_command = L"TestChildProcess "; |
+ test_command += cmd.value().c_str(); |
+ |
+ EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(test_command.c_str())); |
+} |
+ |
+// This test validates that setting the |
+// MITIGATION_CHILD_PROCESS_CREATION_RESTRICTED mitigation prevents |
+// the spawning of child processes. |
+TEST(ProcessMitigationsTest, CheckChildProcessFailure) { |
+ TestRunner runner; |
+ sandbox::TargetPolicy* policy = runner.GetPolicy(); |
+ |
+ // Now set the job level to be <= JOB_LIMITED_USER |
+ // and ensure we can no longer create a child process. |
+ policy->SetJobLevel(JOB_LIMITED_USER, 0); |
+ policy->SetTokenLevel(USER_UNPROTECTED, USER_UNPROTECTED); |
+ runner.SetDisableCsrss(false); |
+ |
+ base::FilePath cmd; |
+ EXPECT_TRUE(base::PathService::Get(base::DIR_SYSTEM, &cmd)); |
+ cmd = cmd.Append(L"calc.exe"); |
+ |
+ std::wstring test_command = L"TestChildProcess "; |
+ test_command += cmd.value().c_str(); |
+ |
+ EXPECT_EQ(SBOX_TEST_FAILED, runner.RunTest(test_command.c_str())); |
+} |
+ |
} // namespace sandbox |