| OLD | NEW |
| (Empty) |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 // Integration tests for restricted tokens. | |
| 6 | |
| 7 #include <stddef.h> | |
| 8 #include <string> | |
| 9 | |
| 10 #include "base/strings/stringprintf.h" | |
| 11 #include "base/win/scoped_handle.h" | |
| 12 #include "sandbox/win/src/sandbox.h" | |
| 13 #include "sandbox/win/src/sandbox_factory.h" | |
| 14 #include "sandbox/win/src/target_services.h" | |
| 15 #include "sandbox/win/tests/common/controller.h" | |
| 16 #include "testing/gtest/include/gtest/gtest.h" | |
| 17 | |
| 18 namespace sandbox { | |
| 19 | |
| 20 namespace { | |
| 21 | |
| 22 int RunOpenProcessTest(bool unsandboxed, | |
| 23 bool lockdown_dacl, | |
| 24 DWORD access_mask) { | |
| 25 TestRunner runner(JOB_NONE, USER_RESTRICTED_SAME_ACCESS, USER_LOCKDOWN); | |
| 26 runner.GetPolicy()->SetDelayedIntegrityLevel(INTEGRITY_LEVEL_UNTRUSTED); | |
| 27 runner.GetPolicy()->SetIntegrityLevel(INTEGRITY_LEVEL_LOW); | |
| 28 if (lockdown_dacl) | |
| 29 runner.GetPolicy()->SetLockdownDefaultDacl(); | |
| 30 runner.SetAsynchronous(true); | |
| 31 // This spins up a renderer level process, we don't care about the result. | |
| 32 runner.RunTest(L"IntegrationTestsTest_args 1"); | |
| 33 | |
| 34 TestRunner runner2(JOB_NONE, USER_RESTRICTED_SAME_ACCESS, USER_LIMITED); | |
| 35 runner2.GetPolicy()->SetDelayedIntegrityLevel(INTEGRITY_LEVEL_LOW); | |
| 36 runner2.GetPolicy()->SetIntegrityLevel(INTEGRITY_LEVEL_LOW); | |
| 37 runner2.SetUnsandboxed(unsandboxed); | |
| 38 return runner2.RunTest( | |
| 39 base::StringPrintf(L"RestrictedTokenTest_openprocess %d 0x%08X", | |
| 40 runner.process_id(), access_mask) | |
| 41 .c_str()); | |
| 42 } | |
| 43 | |
| 44 } // namespace | |
| 45 | |
| 46 // Opens a process based on a PID and access mask passed on the command line. | |
| 47 // Returns SBOX_TEST_SUCCEEDED if process opened successfully. | |
| 48 SBOX_TESTS_COMMAND int RestrictedTokenTest_openprocess(int argc, | |
| 49 wchar_t** argv) { | |
| 50 if (argc < 2) | |
| 51 return SBOX_TEST_NOT_FOUND; | |
| 52 DWORD pid = _wtoi(argv[0]); | |
| 53 if (pid == 0) | |
| 54 return SBOX_TEST_NOT_FOUND; | |
| 55 DWORD desired_access = wcstoul(argv[1], nullptr, 0); | |
| 56 base::win::ScopedHandle process_handle( | |
| 57 ::OpenProcess(desired_access, FALSE, pid)); | |
| 58 if (process_handle.IsValid()) | |
| 59 return SBOX_TEST_SUCCEEDED; | |
| 60 | |
| 61 return SBOX_TEST_DENIED; | |
| 62 } | |
| 63 | |
| 64 TEST(RestrictedTokenTest, OpenLowPrivilegedProcess) { | |
| 65 // Test limited privilege to renderer open. | |
| 66 ASSERT_EQ(SBOX_TEST_SUCCEEDED, | |
| 67 RunOpenProcessTest(false, false, GENERIC_READ | GENERIC_WRITE)); | |
| 68 // Test limited privilege to renderer open with lockdowned DACL. | |
| 69 ASSERT_EQ(SBOX_TEST_DENIED, | |
| 70 RunOpenProcessTest(false, true, GENERIC_READ | GENERIC_WRITE)); | |
| 71 // Ensure we also can't get any access to the process. | |
| 72 ASSERT_EQ(SBOX_TEST_DENIED, RunOpenProcessTest(false, true, MAXIMUM_ALLOWED)); | |
| 73 // Also check for explicit owner allowed WRITE_DAC right. | |
| 74 ASSERT_EQ(SBOX_TEST_DENIED, RunOpenProcessTest(false, true, WRITE_DAC)); | |
| 75 // Ensure unsandboxed process can still open the renderer for all access. | |
| 76 ASSERT_EQ(SBOX_TEST_SUCCEEDED, | |
| 77 RunOpenProcessTest(true, true, PROCESS_ALL_ACCESS)); | |
| 78 } | |
| 79 | |
| 80 } // namespace sandbox | |
| OLD | NEW |