# Copyright 2014 The Chromium Authors
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
import("//testing/libfuzzer/fuzzer_test.gni")
import("//testing/test.gni")
source_set("service_resolver") {
sources = [
"src/resolver.cc",
"src/resolver.h",
"src/service_resolver.cc",
"src/service_resolver.h",
]
if (current_cpu == "x64" || current_cpu == "arm64") {
sources += [
"src/resolver_64.cc",
"src/service_resolver_64.cc",
]
} else if (current_cpu == "x86") {
sources += [
"src/resolver_32.cc",
"src/service_resolver_32.cc",
]
}
public_deps = [
":common",
"//base",
"//sandbox:common",
]
deps = [ "//base:base_static" ]
}
static_library("sandbox") {
sources = [
"src/acl.cc",
"src/acl.h",
"src/alternate_desktop.cc",
"src/alternate_desktop.h",
"src/app_container.h",
"src/app_container_base.cc",
"src/app_container_base.h",
"src/broker_services.cc",
"src/broker_services.h",
"src/crosscall_client.h",
"src/crosscall_params.h",
"src/crosscall_server.cc",
"src/crosscall_server.h",
"src/eat_resolver.cc",
"src/eat_resolver.h",
"src/filesystem_dispatcher.cc",
"src/filesystem_dispatcher.h",
"src/filesystem_interception.cc",
"src/filesystem_interception.h",
"src/filesystem_policy.cc",
"src/filesystem_policy.h",
"src/handle_closer.h",
"src/handle_closer_agent.cc",
"src/handle_closer_agent.h",
"src/heap_helper.cc",
"src/heap_helper.h",
"src/interception.cc",
"src/interception.h",
"src/interception_agent.cc",
"src/interception_agent.h",
"src/interception_internal.h",
"src/interceptors.h",
"src/internal_types.h",
"src/ipc_args.cc",
"src/ipc_args.h",
"src/ipc_tags.h",
"src/job.cc",
"src/job.h",
"src/nt_internals.h",
"src/policy_broker.cc",
"src/policy_broker.h",
"src/policy_engine_opcodes.cc",
"src/policy_engine_opcodes.h",
"src/policy_engine_params.h",
"src/policy_engine_processor.cc",
"src/policy_engine_processor.h",
"src/policy_low_level.cc",
"src/policy_low_level.h",
"src/policy_params.h",
"src/policy_target.cc",
"src/policy_target.h",
"src/process_mitigations.cc",
"src/process_mitigations.h",
"src/process_mitigations_win32k_dispatcher.cc",
"src/process_mitigations_win32k_dispatcher.h",
"src/process_mitigations_win32k_interception.cc",
"src/process_mitigations_win32k_interception.h",
"src/process_mitigations_win32k_policy.cc",
"src/process_mitigations_win32k_policy.h",
"src/process_thread_dispatcher.cc",
"src/process_thread_dispatcher.h",
"src/process_thread_interception.cc",
"src/process_thread_interception.h",
"src/process_thread_policy.cc",
"src/process_thread_policy.h",
"src/restricted_token.cc",
"src/restricted_token.h",
"src/restricted_token_utils.cc",
"src/restricted_token_utils.h",
"src/sandbox.cc",
"src/sandbox_factory.h",
"src/sandbox_globals.cc",
"src/sandbox_nt_types.h",
"src/sandbox_nt_util.cc",
"src/sandbox_nt_util.h",
"src/sandbox_policy_base.cc",
"src/sandbox_policy_base.h",
"src/sandbox_policy_diagnostic.cc",
"src/sandbox_policy_diagnostic.h",
"src/security_capabilities.cc",
"src/security_capabilities.h",
"src/sharedmem_ipc_client.cc",
"src/sharedmem_ipc_client.h",
"src/sharedmem_ipc_server.cc",
"src/sharedmem_ipc_server.h",
"src/signed_dispatcher.cc",
"src/signed_dispatcher.h",
"src/signed_interception.cc",
"src/signed_interception.h",
"src/signed_policy.cc",
"src/signed_policy.h",
"src/startup_information_helper.cc",
"src/startup_information_helper.h",
"src/target_interceptions.cc",
"src/target_interceptions.h",
"src/target_process.cc",
"src/target_process.h",
"src/target_services.cc",
"src/target_services.h",
"src/threadpool.cc",
"src/threadpool.h",
"src/top_level_dispatcher.cc",
"src/top_level_dispatcher.h",
"src/win_utils.cc",
"src/win_utils.h",
"src/window.cc",
"src/window.h",
]
if (current_cpu == "x64" || current_cpu == "arm64") {
sources += [
"src/interceptors_64.cc",
"src/interceptors_64.h",
]
}
# Disable sanitizer coverage in the sandbox code. The sandbox code runs before
# sanitizer coverage can initialize. http://crbug.com/484711
configs -= [ "//build/config/sanitizers:default_sanitizer_flags" ]
configs +=
[ "//build/config/sanitizers:default_sanitizer_flags_but_coverage" ]
configs += [
"//build/config:precompiled_headers",
"//build/config/compiler:prevent_unsafe_narrowing",
]
public_deps = [
":common",
"//base",
"//sandbox:common",
]
deps = [
":maybe_set_appcontainer_acls",
":service_resolver",
"//base:base_static",
]
libs = [
"ntdll.lib",
"userenv.lib",
]
}
test("sbox_integration_tests") {
sources = [
"src/address_sanitizer_test.cc",
"src/app_container_test.cc",
"src/file_policy_test.cc",
"src/handle_closer_test.cc",
"src/handle_inheritance_test.cc",
"src/integrity_level_test.cc",
"src/ipc_leak_test.cc",
"src/ipc_ping_test.cc",
"src/lpc_policy_test.cc",
"src/parallel_launch_test.cc",
"src/policy_target_test.cc",
"src/process_delegate_data_test.cc",
"src/process_mitigations_deathtest.cc",
"src/process_mitigations_dyncode_unittest.cc",
"src/process_mitigations_extensionpoints_unittest.cc",
"src/process_mitigations_unittest.cc",
"src/process_mitigations_win32k_unittest.cc",
"src/process_policy_test.cc",
"src/restricted_token_test.cc",
"src/unload_dll_test.cc",
"src/zero_appshim_unittest.cc",
"tests/common/controller.cc",
"tests/common/test_utils.cc",
"tests/common/test_utils.h",
"tests/integration_tests/cfi_unittest.cc",
"tests/integration_tests/integration_tests.cc",
"tests/integration_tests/integration_tests_common.h",
"tests/integration_tests/integration_tests_test.cc",
]
deps = [
":sandbox",
":test_support",
"//base/test:test_support",
"//sandbox/policy:tests",
"//testing/gtest",
]
data_deps = [
":sbox_integration_test_hooking_dll",
":sbox_integration_test_win_proc",
]
libs = [ "ktmw32.lib" ]
# It is necessary for tests validating win32k lockdown to delayload
# user32.dll, gdi32.dll, and others that depend on them.
configs += [ "//build/config/win:delayloads" ]
}
group("maybe_set_appcontainer_acls") {
# Exclude setting ACLs when build is not happening on Windows.
if (current_cpu == target_cpu && host_os == "win") {
deps = [ ":set_appcontainer_acls" ]
}
}
if (current_cpu == target_cpu && host_os == "win") {
action("set_appcontainer_acls") {
script = "//build/win/set_appcontainer_acls.py"
stamp_file = "$target_out_dir/acls.stamp"
inputs = [ script ]
outputs = [ stamp_file ]
args = [
"--stamp=" + rebase_path(stamp_file, root_out_dir),
"--dir=" + rebase_path(root_out_dir, root_out_dir),
]
}
}
shared_library("sbox_integration_test_hooking_dll") {
testonly = true
sources = [ "tests/integration_tests/hooking_dll.cc" ]
deps = [
":common",
":test_support",
]
}
executable("sbox_integration_test_win_proc") {
testonly = true
sources = [ "tests/integration_tests/hooking_win_proc.cc" ]
configs -= [ "//build/config/win:console" ]
configs += [ "//build/config/win:windowed" ]
deps = [
":common",
":test_support",
]
}
test("sbox_validation_tests") {
sources = [
"tests/common/controller.cc",
"tests/validation_tests/commands.cc",
"tests/validation_tests/commands.h",
"tests/validation_tests/suite.cc",
"tests/validation_tests/unit_tests.cc",
]
deps = [
":sandbox",
":test_support",
"//base/test:test_support",
"//testing/gtest",
]
libs = [ "shlwapi.lib" ]
}
test("sbox_unittests") {
sources = [
"src/acl_unittest.cc",
"src/app_container_unittest.cc",
"src/interception_unittest.cc",
"src/ipc_unittest.cc",
"src/job_unittest.cc",
"src/policy_engine_unittest.cc",
"src/policy_low_level_unittest.cc",
"src/policy_opcodes_unittest.cc",
"src/restricted_token_unittest.cc",
"src/sandbox_nt_util_unittest.cc",
"src/service_resolver_unittest.cc",
"src/target_process_unittest.cc",
"src/threadpool_unittest.cc",
"src/win_utils_unittest.cc",
"tests/common/test_utils.cc",
"tests/common/test_utils.h",
"tests/unit_tests/unit_tests.cc",
]
deps = [
":sandbox",
":service_resolver",
":test_support",
"//base/test:test_support",
"//testing/gtest",
]
}
# This fuzzer will only work on Windows, add fuzz targets which could run on
# Linux to //sandbox/ directly.
fuzzer_test("sandbox_policy_rule_fuzzer") {
sources = [ "fuzzer/sandbox_policy_rule_fuzzer.cc" ]
dict = "fuzzer/sandbox_policy_rule.dict"
deps = [
":sandbox",
"//base",
]
}
fuzzer_test("sandbox_nt_utils_fuzzer") {
sources = [ "fuzzer/sandbox_nt_utils_fuzzer.cc" ]
deps = [ ":sandbox" ]
}
fuzzer_test("sandbox_ipc_fuzzer") {
sources = [ "fuzzer/sandbox_ipc_fuzzer.cc" ]
deps = [ ":sandbox" ]
dict = "fuzzer/ipc.dict"
libfuzzer_options = [ "max_len=1024" ]
}
source_set("common") {
sources = [
"src/sandbox.h",
"src/sandbox_policy.h",
"src/sandbox_types.h",
"src/security_level.h",
]
deps = [ "//base" ]
}
source_set("test_support") {
testonly = true
sources = [
"tests/common/controller.h",
"tests/integration_tests/hooking_dll.h",
"tests/integration_tests/hooking_win_proc.h",
]
deps = [
":common",
"//base",
]
}