chromium/sandbox/win/BUILD.gn

# Copyright 2014 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.

import("//testing/libfuzzer/fuzzer_test.gni")
import("//testing/test.gni")

source_set("service_resolver") {
  sources = [
    "src/resolver.cc",
    "src/resolver.h",
    "src/service_resolver.cc",
    "src/service_resolver.h",
  ]

  if (current_cpu == "x64" || current_cpu == "arm64") {
    sources += [
      "src/resolver_64.cc",
      "src/service_resolver_64.cc",
    ]
  } else if (current_cpu == "x86") {
    sources += [
      "src/resolver_32.cc",
      "src/service_resolver_32.cc",
    ]
  }

  public_deps = [
    ":common",
    "//base",
    "//sandbox:common",
  ]

  deps = [ "//base:base_static" ]
}

static_library("sandbox") {
  sources = [
    "src/acl.cc",
    "src/acl.h",
    "src/alternate_desktop.cc",
    "src/alternate_desktop.h",
    "src/app_container.h",
    "src/app_container_base.cc",
    "src/app_container_base.h",
    "src/broker_services.cc",
    "src/broker_services.h",
    "src/crosscall_client.h",
    "src/crosscall_params.h",
    "src/crosscall_server.cc",
    "src/crosscall_server.h",
    "src/eat_resolver.cc",
    "src/eat_resolver.h",
    "src/filesystem_dispatcher.cc",
    "src/filesystem_dispatcher.h",
    "src/filesystem_interception.cc",
    "src/filesystem_interception.h",
    "src/filesystem_policy.cc",
    "src/filesystem_policy.h",
    "src/handle_closer.h",
    "src/handle_closer_agent.cc",
    "src/handle_closer_agent.h",
    "src/heap_helper.cc",
    "src/heap_helper.h",
    "src/interception.cc",
    "src/interception.h",
    "src/interception_agent.cc",
    "src/interception_agent.h",
    "src/interception_internal.h",
    "src/interceptors.h",
    "src/internal_types.h",
    "src/ipc_args.cc",
    "src/ipc_args.h",
    "src/ipc_tags.h",
    "src/job.cc",
    "src/job.h",
    "src/nt_internals.h",
    "src/policy_broker.cc",
    "src/policy_broker.h",
    "src/policy_engine_opcodes.cc",
    "src/policy_engine_opcodes.h",
    "src/policy_engine_params.h",
    "src/policy_engine_processor.cc",
    "src/policy_engine_processor.h",
    "src/policy_low_level.cc",
    "src/policy_low_level.h",
    "src/policy_params.h",
    "src/policy_target.cc",
    "src/policy_target.h",
    "src/process_mitigations.cc",
    "src/process_mitigations.h",
    "src/process_mitigations_win32k_dispatcher.cc",
    "src/process_mitigations_win32k_dispatcher.h",
    "src/process_mitigations_win32k_interception.cc",
    "src/process_mitigations_win32k_interception.h",
    "src/process_mitigations_win32k_policy.cc",
    "src/process_mitigations_win32k_policy.h",
    "src/process_thread_dispatcher.cc",
    "src/process_thread_dispatcher.h",
    "src/process_thread_interception.cc",
    "src/process_thread_interception.h",
    "src/process_thread_policy.cc",
    "src/process_thread_policy.h",
    "src/restricted_token.cc",
    "src/restricted_token.h",
    "src/restricted_token_utils.cc",
    "src/restricted_token_utils.h",
    "src/sandbox.cc",
    "src/sandbox_factory.h",
    "src/sandbox_globals.cc",
    "src/sandbox_nt_types.h",
    "src/sandbox_nt_util.cc",
    "src/sandbox_nt_util.h",
    "src/sandbox_policy_base.cc",
    "src/sandbox_policy_base.h",
    "src/sandbox_policy_diagnostic.cc",
    "src/sandbox_policy_diagnostic.h",
    "src/security_capabilities.cc",
    "src/security_capabilities.h",
    "src/sharedmem_ipc_client.cc",
    "src/sharedmem_ipc_client.h",
    "src/sharedmem_ipc_server.cc",
    "src/sharedmem_ipc_server.h",
    "src/signed_dispatcher.cc",
    "src/signed_dispatcher.h",
    "src/signed_interception.cc",
    "src/signed_interception.h",
    "src/signed_policy.cc",
    "src/signed_policy.h",
    "src/startup_information_helper.cc",
    "src/startup_information_helper.h",
    "src/target_interceptions.cc",
    "src/target_interceptions.h",
    "src/target_process.cc",
    "src/target_process.h",
    "src/target_services.cc",
    "src/target_services.h",
    "src/threadpool.cc",
    "src/threadpool.h",
    "src/top_level_dispatcher.cc",
    "src/top_level_dispatcher.h",
    "src/win_utils.cc",
    "src/win_utils.h",
    "src/window.cc",
    "src/window.h",
  ]

  if (current_cpu == "x64" || current_cpu == "arm64") {
    sources += [
      "src/interceptors_64.cc",
      "src/interceptors_64.h",
    ]
  }

  # Disable sanitizer coverage in the sandbox code. The sandbox code runs before
  # sanitizer coverage can initialize. http://crbug.com/484711
  configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ]
  configs +=
      [ "//build/config/sanitizers:default_sanitizer_flags_but_coverage" ]

  configs += [
    "//build/config:precompiled_headers",
    "//build/config/compiler:prevent_unsafe_narrowing",
  ]

  public_deps = [
    ":common",
    "//base",
    "//sandbox:common",
  ]

  deps = [
    ":maybe_set_appcontainer_acls",
    ":service_resolver",
    "//base:base_static",
  ]

  libs = [
    "ntdll.lib",
    "userenv.lib",
  ]
}

test("sbox_integration_tests") {
  sources = [
    "src/address_sanitizer_test.cc",
    "src/app_container_test.cc",
    "src/file_policy_test.cc",
    "src/handle_closer_test.cc",
    "src/handle_inheritance_test.cc",
    "src/integrity_level_test.cc",
    "src/ipc_leak_test.cc",
    "src/ipc_ping_test.cc",
    "src/lpc_policy_test.cc",
    "src/parallel_launch_test.cc",
    "src/policy_target_test.cc",
    "src/process_delegate_data_test.cc",
    "src/process_mitigations_deathtest.cc",
    "src/process_mitigations_dyncode_unittest.cc",
    "src/process_mitigations_extensionpoints_unittest.cc",
    "src/process_mitigations_unittest.cc",
    "src/process_mitigations_win32k_unittest.cc",
    "src/process_policy_test.cc",
    "src/restricted_token_test.cc",
    "src/unload_dll_test.cc",
    "src/zero_appshim_unittest.cc",
    "tests/common/controller.cc",
    "tests/common/test_utils.cc",
    "tests/common/test_utils.h",
    "tests/integration_tests/cfi_unittest.cc",
    "tests/integration_tests/integration_tests.cc",
    "tests/integration_tests/integration_tests_common.h",
    "tests/integration_tests/integration_tests_test.cc",
  ]

  deps = [
    ":sandbox",
    ":test_support",
    "//base/test:test_support",
    "//sandbox/policy:tests",
    "//testing/gtest",
  ]

  data_deps = [
    ":sbox_integration_test_hooking_dll",
    ":sbox_integration_test_win_proc",
  ]

  libs = [ "ktmw32.lib" ]

  # It is necessary for tests validating win32k lockdown to delayload
  # user32.dll, gdi32.dll, and others that depend on them.
  configs += [ "//build/config/win:delayloads" ]
}

group("maybe_set_appcontainer_acls") {
  # Exclude setting ACLs when build is not happening on Windows.
  if (current_cpu == target_cpu && host_os == "win") {
    deps = [ ":set_appcontainer_acls" ]
  }
}

if (current_cpu == target_cpu && host_os == "win") {
  action("set_appcontainer_acls") {
    script = "//build/win/set_appcontainer_acls.py"
    stamp_file = "$target_out_dir/acls.stamp"
    inputs = [ script ]
    outputs = [ stamp_file ]

    args = [
      "--stamp=" + rebase_path(stamp_file, root_out_dir),
      "--dir=" + rebase_path(root_out_dir, root_out_dir),
    ]
  }
}

shared_library("sbox_integration_test_hooking_dll") {
  testonly = true
  sources = [ "tests/integration_tests/hooking_dll.cc" ]

  deps = [
    ":common",
    ":test_support",
  ]
}

executable("sbox_integration_test_win_proc") {
  testonly = true
  sources = [ "tests/integration_tests/hooking_win_proc.cc" ]

  configs -= [ "//build/config/win:console" ]
  configs += [ "//build/config/win:windowed" ]

  deps = [
    ":common",
    ":test_support",
  ]
}

test("sbox_validation_tests") {
  sources = [
    "tests/common/controller.cc",
    "tests/validation_tests/commands.cc",
    "tests/validation_tests/commands.h",
    "tests/validation_tests/suite.cc",
    "tests/validation_tests/unit_tests.cc",
  ]

  deps = [
    ":sandbox",
    ":test_support",
    "//base/test:test_support",
    "//testing/gtest",
  ]

  libs = [ "shlwapi.lib" ]
}

test("sbox_unittests") {
  sources = [
    "src/acl_unittest.cc",
    "src/app_container_unittest.cc",
    "src/interception_unittest.cc",
    "src/ipc_unittest.cc",
    "src/job_unittest.cc",
    "src/policy_engine_unittest.cc",
    "src/policy_low_level_unittest.cc",
    "src/policy_opcodes_unittest.cc",
    "src/restricted_token_unittest.cc",
    "src/sandbox_nt_util_unittest.cc",
    "src/service_resolver_unittest.cc",
    "src/target_process_unittest.cc",
    "src/threadpool_unittest.cc",
    "src/win_utils_unittest.cc",
    "tests/common/test_utils.cc",
    "tests/common/test_utils.h",
    "tests/unit_tests/unit_tests.cc",
  ]

  deps = [
    ":sandbox",
    ":service_resolver",
    ":test_support",
    "//base/test:test_support",
    "//testing/gtest",
  ]
}

# This fuzzer will only work on Windows, add fuzz targets which could run on
# Linux to //sandbox/ directly.
fuzzer_test("sandbox_policy_rule_fuzzer") {
  sources = [ "fuzzer/sandbox_policy_rule_fuzzer.cc" ]
  dict = "fuzzer/sandbox_policy_rule.dict"
  deps = [
    ":sandbox",
    "//base",
  ]
}

fuzzer_test("sandbox_nt_utils_fuzzer") {
  sources = [ "fuzzer/sandbox_nt_utils_fuzzer.cc" ]
  deps = [ ":sandbox" ]
}

fuzzer_test("sandbox_ipc_fuzzer") {
  sources = [ "fuzzer/sandbox_ipc_fuzzer.cc" ]
  deps = [ ":sandbox" ]
  dict = "fuzzer/ipc.dict"
  libfuzzer_options = [ "max_len=1024" ]
}

source_set("common") {
  sources = [
    "src/sandbox.h",
    "src/sandbox_policy.h",
    "src/sandbox_types.h",
    "src/security_level.h",
  ]

  deps = [ "//base" ]
}

source_set("test_support") {
  testonly = true
  sources = [
    "tests/common/controller.h",
    "tests/integration_tests/hooking_dll.h",
    "tests/integration_tests/hooking_win_proc.h",
  ]
  deps = [
    ":common",
    "//base",
  ]
}