| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <memory> | 5 #include <memory> |
| 6 #include <string> | 6 #include <string> |
| 7 | 7 |
| 8 #include "base/strings/string16.h" | 8 #include "base/strings/string16.h" |
| 9 #include "base/strings/sys_string_conversions.h" | 9 #include "base/strings/sys_string_conversions.h" |
| 10 #include "base/win/scoped_handle.h" | 10 #include "base/win/scoped_handle.h" |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 43 const wchar_t *exe_name = NULL; | 43 const wchar_t *exe_name = NULL; |
| 44 if (!exe.empty()) | 44 if (!exe.empty()) |
| 45 exe_name = exe.c_str(); | 45 exe_name = exe.c_str(); |
| 46 | 46 |
| 47 const wchar_t *cmd_line = NULL; | 47 const wchar_t *cmd_line = NULL; |
| 48 if (!command.empty()) | 48 if (!command.empty()) |
| 49 cmd_line = command.c_str(); | 49 cmd_line = command.c_str(); |
| 50 | 50 |
| 51 // Create the process with the unicode version of the API. | 51 // Create the process with the unicode version of the API. |
| 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; | 52 sandbox::SboxTestResult ret1 = sandbox::SBOX_TEST_FAILED; |
| 53 PROCESS_INFORMATION temp_process_info = {}; | 53 if (!::CreateProcessW(exe_name, const_cast<wchar_t*>(cmd_line), NULL, NULL, |
| 54 if (::CreateProcessW(exe_name, const_cast<wchar_t*>(cmd_line), NULL, NULL, | 54 FALSE, 0, NULL, NULL, &si, pi.Receive())) { |
| 55 FALSE, 0, NULL, NULL, &si, &temp_process_info)) { | |
| 56 pi.Set(temp_process_info); | |
| 57 ret1 = sandbox::SBOX_TEST_SUCCEEDED; | |
| 58 } else { | |
| 59 DWORD last_error = GetLastError(); | 55 DWORD last_error = GetLastError(); |
| 60 if ((ERROR_NOT_ENOUGH_QUOTA == last_error) || | 56 if ((ERROR_NOT_ENOUGH_QUOTA == last_error) || |
| 61 (ERROR_ACCESS_DENIED == last_error) || | 57 (ERROR_ACCESS_DENIED == last_error) || |
| 62 (ERROR_FILE_NOT_FOUND == last_error)) { | 58 (ERROR_FILE_NOT_FOUND == last_error)) { |
| 63 ret1 = sandbox::SBOX_TEST_DENIED; | 59 ret1 = sandbox::SBOX_TEST_DENIED; |
| 64 } else { | 60 } else { |
| 65 ret1 = sandbox::SBOX_TEST_FAILED; | 61 ret1 = sandbox::SBOX_TEST_FAILED; |
| 66 } | 62 } |
| 63 } else { |
| 64 ret1 = sandbox::SBOX_TEST_SUCCEEDED; |
| 67 } | 65 } |
| 68 | 66 |
| 69 pi.Close(); | 67 pi.Close(); |
| 70 | 68 |
| 71 // Do the same with the ansi version of the api | 69 // Do the same with the ansi version of the api |
| 72 STARTUPINFOA sia = {sizeof(sia)}; | 70 STARTUPINFOA sia = {sizeof(sia)}; |
| 73 sandbox::SboxTestResult ret2 = sandbox::SBOX_TEST_FAILED; | 71 sandbox::SboxTestResult ret2 = sandbox::SBOX_TEST_FAILED; |
| 74 | 72 |
| 75 std::string narrow_cmd_line; | 73 std::string narrow_cmd_line; |
| 76 if (cmd_line) | 74 if (cmd_line) |
| 77 narrow_cmd_line = base::SysWideToMultiByte(cmd_line, CP_UTF8); | 75 narrow_cmd_line = base::SysWideToMultiByte(cmd_line, CP_UTF8); |
| 78 if (::CreateProcessA( | 76 if (!::CreateProcessA( |
| 79 exe_name ? base::SysWideToMultiByte(exe_name, CP_UTF8).c_str() : NULL, | 77 exe_name ? base::SysWideToMultiByte(exe_name, CP_UTF8).c_str() : NULL, |
| 80 cmd_line ? const_cast<char*>(narrow_cmd_line.c_str()) : NULL, | 78 cmd_line ? const_cast<char*>(narrow_cmd_line.c_str()) : NULL, |
| 81 NULL, NULL, FALSE, 0, NULL, NULL, &sia, &temp_process_info)) { | 79 NULL, NULL, FALSE, 0, NULL, NULL, &sia, pi.Receive())) { |
| 82 pi.Set(temp_process_info); | |
| 83 ret2 = sandbox::SBOX_TEST_SUCCEEDED; | |
| 84 } else { | |
| 85 DWORD last_error = GetLastError(); | 80 DWORD last_error = GetLastError(); |
| 86 if ((ERROR_NOT_ENOUGH_QUOTA == last_error) || | 81 if ((ERROR_NOT_ENOUGH_QUOTA == last_error) || |
| 87 (ERROR_ACCESS_DENIED == last_error) || | 82 (ERROR_ACCESS_DENIED == last_error) || |
| 88 (ERROR_FILE_NOT_FOUND == last_error)) { | 83 (ERROR_FILE_NOT_FOUND == last_error)) { |
| 89 ret2 = sandbox::SBOX_TEST_DENIED; | 84 ret2 = sandbox::SBOX_TEST_DENIED; |
| 90 } else { | 85 } else { |
| 91 ret2 = sandbox::SBOX_TEST_FAILED; | 86 ret2 = sandbox::SBOX_TEST_FAILED; |
| 92 } | 87 } |
| 88 } else { |
| 89 ret2 = sandbox::SBOX_TEST_SUCCEEDED; |
| 93 } | 90 } |
| 94 | 91 |
| 95 if (ret1 == ret2) | 92 if (ret1 == ret2) |
| 96 return ret1; | 93 return ret1; |
| 97 | 94 |
| 98 return sandbox::SBOX_TEST_FAILED; | 95 return sandbox::SBOX_TEST_FAILED; |
| 99 } | 96 } |
| 100 | 97 |
| 101 } // namespace | 98 } // namespace |
| 102 | 99 |
| (...skipping 108 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 211 // Creates a process and checks if it's possible to get a handle to it's token. | 208 // Creates a process and checks if it's possible to get a handle to it's token. |
| 212 SBOX_TESTS_COMMAND int Process_GetChildProcessToken(int argc, wchar_t **argv) { | 209 SBOX_TESTS_COMMAND int Process_GetChildProcessToken(int argc, wchar_t **argv) { |
| 213 if (argc != 1) | 210 if (argc != 1) |
| 214 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | 211 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
| 215 | 212 |
| 216 if ((NULL == argv) || (NULL == argv[0])) | 213 if ((NULL == argv) || (NULL == argv[0])) |
| 217 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; | 214 return SBOX_TEST_FAILED_TO_EXECUTE_COMMAND; |
| 218 | 215 |
| 219 string16 path = MakeFullPathToSystem32(argv[0]); | 216 string16 path = MakeFullPathToSystem32(argv[0]); |
| 220 | 217 |
| 218 base::win::ScopedProcessInformation pi; |
| 221 STARTUPINFOW si = {sizeof(si)}; | 219 STARTUPINFOW si = {sizeof(si)}; |
| 222 | 220 |
| 223 PROCESS_INFORMATION temp_process_info = {}; | |
| 224 if (!::CreateProcessW(path.c_str(), NULL, NULL, NULL, FALSE, CREATE_SUSPENDED, | 221 if (!::CreateProcessW(path.c_str(), NULL, NULL, NULL, FALSE, CREATE_SUSPENDED, |
| 225 NULL, NULL, &si, &temp_process_info)) { | 222 NULL, NULL, &si, pi.Receive())) { |
| 226 return SBOX_TEST_FAILED; | 223 return SBOX_TEST_FAILED; |
| 227 } | 224 } |
| 228 base::win::ScopedProcessInformation pi(temp_process_info); | |
| 229 | 225 |
| 230 HANDLE token = NULL; | 226 HANDLE token = NULL; |
| 231 BOOL result = | 227 BOOL result = |
| 232 ::OpenProcessToken(pi.process_handle(), TOKEN_IMPERSONATE, &token); | 228 ::OpenProcessToken(pi.process_handle(), TOKEN_IMPERSONATE, &token); |
| 233 DWORD error = ::GetLastError(); | 229 DWORD error = ::GetLastError(); |
| 234 | 230 |
| 235 base::win::ScopedHandle token_handle(token); | 231 base::win::ScopedHandle token_handle(token); |
| 236 | 232 |
| 237 if (!::TerminateProcess(pi.process_handle(), 0)) | 233 if (!::TerminateProcess(pi.process_handle(), 0)) |
| 238 return SBOX_TEST_FAILED; | 234 return SBOX_TEST_FAILED; |
| (...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 379 ASSERT_TRUE(!exe_path.empty()); | 375 ASSERT_TRUE(!exe_path.empty()); |
| 380 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, | 376 EXPECT_TRUE(runner.AddRule(TargetPolicy::SUBSYS_PROCESS, |
| 381 TargetPolicy::PROCESS_ALL_EXEC, | 377 TargetPolicy::PROCESS_ALL_EXEC, |
| 382 exe_path.c_str())); | 378 exe_path.c_str())); |
| 383 | 379 |
| 384 EXPECT_EQ(SBOX_TEST_SUCCEEDED, | 380 EXPECT_EQ(SBOX_TEST_SUCCEEDED, |
| 385 runner.RunTest(L"Process_GetChildProcessToken findstr.exe")); | 381 runner.RunTest(L"Process_GetChildProcessToken findstr.exe")); |
| 386 } | 382 } |
| 387 | 383 |
| 388 } // namespace sandbox | 384 } // namespace sandbox |
| OLD | NEW |