blob: 884e331bff48252de03a1f49146125b49bad538d [file] [log] [blame]
// Copyright 2011 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "sandbox/win/src/win_utils.h"
#include <windows.h>
#include <ntstatus.h>
#include <psapi.h>
#include <vector>
#include "base/containers/contains.h"
#include "base/files/file_path.h"
#include "base/files/file_util.h"
#include "base/files/scoped_temp_dir.h"
#include "base/format_macros.h"
#include "base/numerics/safe_conversions.h"
#include "base/path_service.h"
#include "base/rand_util.h"
#include "base/strings/string_util_win.h"
#include "base/strings/stringprintf.h"
#include "base/strings/utf_string_conversions.h"
#include "base/win/scoped_handle.h"
#include "base/win/scoped_process_information.h"
#include "sandbox/win/src/nt_internals.h"
#include "sandbox/win/tests/common/test_utils.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace sandbox {
namespace {
class ScopedTerminateProcess {
public:
explicit ScopedTerminateProcess(HANDLE process) : process_(process) {}
~ScopedTerminateProcess() { ::TerminateProcess(process_, 0); }
private:
HANDLE process_;
};
bool GetModuleList(HANDLE process, std::vector<HMODULE>* result) {
std::vector<HMODULE> modules(256);
DWORD size_needed = 0;
if (EnumProcessModules(
process, &modules[0],
base::checked_cast<DWORD>(modules.size() * sizeof(HMODULE)),
&size_needed)) {
result->assign(modules.begin(),
modules.begin() + (size_needed / sizeof(HMODULE)));
return true;
}
modules.resize(size_needed / sizeof(HMODULE));
// Avoid the undefined-behavior of calling modules[0] on an empty list. This
// can happen if the process has not yet started or has already exited.
if (modules.size() == 0) {
return false;
}
if (EnumProcessModules(
process, &modules[0],
base::checked_cast<DWORD>(modules.size() * sizeof(HMODULE)),
&size_needed)) {
result->assign(modules.begin(),
modules.begin() + (size_needed / sizeof(HMODULE)));
return true;
}
return false;
}
std::wstring GetRandomName() {
return base::ASCIIToWide(
base::StringPrintf("chrome_%016" PRIX64 "%016" PRIX64, base::RandUint64(),
base::RandUint64()));
}
void CompareHandlePath(const base::win::ScopedHandle& handle,
const std::wstring& expected_path) {
auto path = GetPathFromHandle(handle.get());
ASSERT_TRUE(path.has_value());
EXPECT_TRUE(base::EqualsCaseInsensitiveASCII(path.value(), expected_path));
}
void CompareHandleType(const base::win::ScopedHandle& handle,
const std::wstring& expected_type) {
auto type_name = GetTypeNameFromHandle(handle.get());
ASSERT_TRUE(type_name);
EXPECT_TRUE(
base::EqualsCaseInsensitiveASCII(type_name.value(), expected_type));
}
void FindHandle(const ProcessHandleMap& handle_map,
const wchar_t* type_name,
const base::win::ScopedHandle& handle) {
ProcessHandleMap::const_iterator entry = handle_map.find(type_name);
ASSERT_NE(handle_map.end(), entry);
EXPECT_TRUE(base::Contains(entry->second, handle.get()));
}
void TestCurrentProcessHandles(std::optional<ProcessHandleMap> (*func)()) {
std::wstring random_name = GetRandomName();
ASSERT_FALSE(random_name.empty());
base::win::ScopedHandle event_handle(
::CreateEvent(nullptr, FALSE, FALSE, random_name.c_str()));
ASSERT_TRUE(event_handle.is_valid());
std::wstring pipe_name = L"\\\\.\\pipe\\" + random_name;
base::win::ScopedHandle pipe_handle(::CreateNamedPipe(
pipe_name.c_str(), PIPE_ACCESS_DUPLEX, PIPE_TYPE_BYTE,
PIPE_UNLIMITED_INSTANCES, 0, 0, NMPWAIT_USE_DEFAULT_WAIT, nullptr));
ASSERT_TRUE(pipe_handle.is_valid());
std::optional<ProcessHandleMap> handle_map = func();
ASSERT_TRUE(handle_map);
EXPECT_LE(2U, handle_map->size());
FindHandle(*handle_map, L"Event", event_handle);
FindHandle(*handle_map, L"File", pipe_handle);
}
} // namespace
TEST(WinUtils, IsReparsePoint) {
using sandbox::IsReparsePoint;
// Create a temp file because we need write access to it.
wchar_t temp_directory[MAX_PATH];
wchar_t my_folder[MAX_PATH];
ASSERT_NE(::GetTempPath(MAX_PATH, temp_directory), 0u);
ASSERT_NE(::GetTempFileName(temp_directory, L"test", 0, my_folder), 0u);
// Delete the file and create a directory instead.
ASSERT_TRUE(::DeleteFile(my_folder));
ASSERT_TRUE(::CreateDirectory(my_folder, nullptr));
EXPECT_EQ(static_cast<DWORD>(ERROR_NOT_A_REPARSE_POINT),
IsReparsePoint(my_folder));
std::wstring not_found = std::wstring(my_folder) + L"\\foo\\bar";
EXPECT_EQ(static_cast<DWORD>(ERROR_NOT_A_REPARSE_POINT),
IsReparsePoint(not_found));
std::wstring new_file = std::wstring(my_folder) + L"\\foo";
EXPECT_EQ(static_cast<DWORD>(ERROR_NOT_A_REPARSE_POINT),
IsReparsePoint(new_file));
// Replace the directory with a reparse point to %temp%.
HANDLE dir = ::CreateFile(my_folder, FILE_WRITE_DATA,
FILE_SHARE_READ | FILE_SHARE_WRITE, nullptr,
OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, nullptr);
EXPECT_NE(INVALID_HANDLE_VALUE, dir);
std::wstring temp_dir_nt = std::wstring(L"\\??\\") + temp_directory;
EXPECT_TRUE(SetReparsePoint(dir, temp_dir_nt.c_str()));
EXPECT_EQ(static_cast<DWORD>(ERROR_SUCCESS), IsReparsePoint(new_file));
EXPECT_TRUE(DeleteReparsePoint(dir));
EXPECT_TRUE(::CloseHandle(dir));
EXPECT_TRUE(::RemoveDirectory(my_folder));
}
TEST(WinUtils, SameObject) {
using sandbox::SameObject;
// Create a temp file because we need write access to it.
wchar_t temp_directory[MAX_PATH];
wchar_t my_folder[MAX_PATH];
ASSERT_NE(::GetTempPath(MAX_PATH, temp_directory), 0u);
ASSERT_NE(::GetTempFileName(temp_directory, L"test", 0, my_folder), 0u);
// Delete the file and create a directory instead.
ASSERT_TRUE(::DeleteFile(my_folder));
ASSERT_TRUE(::CreateDirectory(my_folder, nullptr));
std::wstring folder(my_folder);
std::wstring file_name = folder + L"\\foo.txt";
const ULONG kSharing = FILE_SHARE_WRITE | FILE_SHARE_READ | FILE_SHARE_DELETE;
base::win::ScopedHandle file(CreateFile(file_name.c_str(), GENERIC_WRITE,
kSharing, nullptr, CREATE_ALWAYS,
FILE_FLAG_DELETE_ON_CLOSE, nullptr));
EXPECT_TRUE(file.is_valid());
std::wstring file_name_nt1 = std::wstring(L"\\??\\") + file_name;
std::wstring file_name_nt2 = std::wstring(L"\\??\\") + folder + L"\\FOO.txT";
EXPECT_TRUE(SameObject(file.get(), file_name_nt1.c_str()));
EXPECT_TRUE(SameObject(file.get(), file_name_nt2.c_str()));
file.Close();
EXPECT_TRUE(::RemoveDirectory(my_folder));
}
TEST(WinUtils, IsPipe) {
using sandbox::IsPipe;
std::wstring pipe_name = L"\\??\\pipe\\mypipe";
EXPECT_TRUE(IsPipe(pipe_name));
pipe_name = L"\\??\\PiPe\\mypipe";
EXPECT_TRUE(IsPipe(pipe_name));
pipe_name = L"\\??\\pipe";
EXPECT_FALSE(IsPipe(pipe_name));
pipe_name = L"\\??\\_pipe_\\mypipe";
EXPECT_FALSE(IsPipe(pipe_name));
pipe_name = L"\\??\\ABCD\\mypipe";
EXPECT_FALSE(IsPipe(pipe_name));
// Written as two strings to prevent trigraph '?' '?' '/'.
pipe_name =
L"/?"
L"?/pipe/mypipe";
EXPECT_FALSE(IsPipe(pipe_name));
pipe_name = L"\\XX\\pipe\\mypipe";
EXPECT_FALSE(IsPipe(pipe_name));
pipe_name = L"\\Device\\NamedPipe\\mypipe";
EXPECT_FALSE(IsPipe(pipe_name));
}
TEST(WinUtils, NtStatusToWin32Error) {
using sandbox::GetLastErrorFromNtStatus;
EXPECT_EQ(static_cast<DWORD>(ERROR_SUCCESS),
GetLastErrorFromNtStatus(STATUS_SUCCESS));
EXPECT_EQ(static_cast<DWORD>(ERROR_NOT_SUPPORTED),
GetLastErrorFromNtStatus(STATUS_NOT_SUPPORTED));
EXPECT_EQ(static_cast<DWORD>(ERROR_ALREADY_EXISTS),
GetLastErrorFromNtStatus(STATUS_OBJECT_NAME_COLLISION));
EXPECT_EQ(static_cast<DWORD>(ERROR_ACCESS_DENIED),
GetLastErrorFromNtStatus(STATUS_ACCESS_DENIED));
}
TEST(WinUtils, GetProcessBaseAddress) {
using sandbox::GetProcessBaseAddress;
STARTUPINFO start_info = {};
PROCESS_INFORMATION proc_info = {};
// The child process for this test must be a GUI app so that WaitForInputIdle
// can be used to guarantee that the child process has started but has not
// exited. notepad was used but will fail on Windows 11 if the store version
// of notepad is not installed.
WCHAR command_line[] = L"calc";
start_info.cb = sizeof(start_info);
start_info.dwFlags = STARTF_USESHOWWINDOW;
start_info.wShowWindow = SW_HIDE;
ASSERT_TRUE(::CreateProcessW(nullptr, command_line, nullptr, nullptr, false,
CREATE_SUSPENDED, nullptr, nullptr, &start_info,
&proc_info));
base::win::ScopedProcessInformation scoped_proc_info(proc_info);
ScopedTerminateProcess process_terminate(scoped_proc_info.process_handle());
void* base_address = GetProcessBaseAddress(scoped_proc_info.process_handle());
ASSERT_NE(nullptr, base_address);
ASSERT_NE(static_cast<DWORD>(-1),
::ResumeThread(scoped_proc_info.thread_handle()));
::WaitForInputIdle(scoped_proc_info.process_handle(), 1000);
ASSERT_NE(static_cast<DWORD>(-1),
::SuspendThread(scoped_proc_info.thread_handle()));
std::vector<HMODULE> modules;
// Compare against the loader's module list (which should now be initialized).
ASSERT_TRUE(GetModuleList(scoped_proc_info.process_handle(), &modules));
ASSERT_GT(modules.size(), 0U);
EXPECT_EQ(base_address, modules[0]);
}
// This test requires an elevated prompt to setup.
TEST(WinUtils, ConvertToLongPath) {
// Test setup.
base::FilePath orig_path;
ASSERT_TRUE(base::PathService::Get(base::DIR_SYSTEM, &orig_path));
orig_path = orig_path.Append(L"calc.exe");
base::ScopedTempDir temp_dir;
base::FilePath base_path;
ASSERT_TRUE(base::PathService::Get(base::DIR_COMMON_APP_DATA, &base_path));
ASSERT_TRUE(temp_dir.CreateUniqueTempDirUnderPath(base_path));
base::FilePath temp_path = temp_dir.GetPath().Append(L"test_calc.exe");
ASSERT_TRUE(base::CopyFile(orig_path, temp_path));
// WIN32 long path: "C:\ProgramData\%TEMP%\test_calc.exe"
wchar_t short_path[MAX_PATH] = {};
DWORD size =
::GetShortPathNameW(temp_path.value().c_str(), short_path, MAX_PATH);
EXPECT_TRUE(size > 0 && size < MAX_PATH);
// WIN32 short path: "C:\PROGRA~3\%TEMP%\TEST_C~1.exe"
// Sanity check that we actually got a short path above! Small chance
// it was disabled in the filesystem setup.
EXPECT_NE(temp_path.value().length(), ::wcslen(short_path));
auto short_form_native_path =
sandbox::GetNtPathFromWin32Path(std::wstring(short_path));
EXPECT_TRUE(short_form_native_path);
// NT short path: "\Device\HarddiskVolume4\PROGRA~3\%TEMP%\TEST_C~1.EXE"
// Test 1: convert win32 short path to long:
std::wstring test1(short_path);
EXPECT_TRUE(sandbox::ConvertToLongPath(&test1));
EXPECT_TRUE(::wcsicmp(temp_path.value().c_str(), test1.c_str()) == 0);
// Expected result: "C:\ProgramData\%TEMP%\test_calc.exe"
// Test 2: convert native short path to long:
std::wstring drive_letter = temp_path.value().substr(0, 3);
std::wstring test2(short_form_native_path.value());
EXPECT_TRUE(sandbox::ConvertToLongPath(&test2, &drive_letter));
size_t index = short_form_native_path->find_first_of(
L'\\', ::wcslen(L"\\Device\\HarddiskVolume"));
EXPECT_TRUE(index != std::wstring::npos);
std::wstring expected_result = short_form_native_path->substr(0, index + 1);
expected_result.append(temp_path.value().substr(3));
EXPECT_TRUE(::wcsicmp(expected_result.c_str(), test2.c_str()) == 0);
// Expected result: "\Device\HarddiskVolumeX\ProgramData\%TEMP%\test_calc.exe"
}
TEST(WinUtils, GetPathAndTypeFromHandle) {
EXPECT_FALSE(GetPathFromHandle(nullptr));
EXPECT_FALSE(GetTypeNameFromHandle(nullptr));
std::wstring random_name = GetRandomName();
ASSERT_FALSE(random_name.empty());
std::wstring event_name = L"Global\\" + random_name;
base::win::ScopedHandle event_handle(
::CreateEvent(nullptr, FALSE, FALSE, event_name.c_str()));
ASSERT_TRUE(event_handle.is_valid());
CompareHandlePath(event_handle, L"\\BaseNamedObjects\\" + random_name);
CompareHandleType(event_handle, L"Event");
std::wstring pipe_name = L"\\\\.\\pipe\\" + random_name;
base::win::ScopedHandle pipe_handle(::CreateNamedPipe(
pipe_name.c_str(), PIPE_ACCESS_DUPLEX, PIPE_TYPE_BYTE,
PIPE_UNLIMITED_INSTANCES, 0, 0, NMPWAIT_USE_DEFAULT_WAIT, nullptr));
ASSERT_TRUE(pipe_handle.is_valid());
CompareHandlePath(pipe_handle, L"\\Device\\NamedPipe\\" + random_name);
CompareHandleType(pipe_handle, L"File");
}
TEST(WinUtils, GetCurrentProcessHandles) {
TestCurrentProcessHandles(GetCurrentProcessHandles);
}
} // namespace sandbox