// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/test/test_file_util.h" #include #include #include #include #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/logging.h" #include "base/strings/string_split.h" #include "base/threading/platform_thread.h" #include "base/win/scoped_handle.h" namespace base { static const ptrdiff_t kOneMB = 1024 * 1024; namespace { struct PermissionInfo { PSECURITY_DESCRIPTOR security_descriptor; ACL dacl; }; // Deny |permission| on the file |path|, for the current user. bool DenyFilePermission(const FilePath& path, DWORD permission) { PACL old_dacl; PSECURITY_DESCRIPTOR security_descriptor; if (GetNamedSecurityInfo(const_cast(path.value().c_str()), SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &old_dacl, NULL, &security_descriptor) != ERROR_SUCCESS) { return false; } EXPLICIT_ACCESS change; change.grfAccessPermissions = permission; change.grfAccessMode = DENY_ACCESS; change.grfInheritance = 0; change.Trustee.pMultipleTrustee = NULL; change.Trustee.MultipleTrusteeOperation = NO_MULTIPLE_TRUSTEE; change.Trustee.TrusteeForm = TRUSTEE_IS_NAME; change.Trustee.TrusteeType = TRUSTEE_IS_USER; change.Trustee.ptstrName = const_cast(L"CURRENT_USER"); PACL new_dacl; if (SetEntriesInAcl(1, &change, old_dacl, &new_dacl) != ERROR_SUCCESS) { LocalFree(security_descriptor); return false; } DWORD rc = SetNamedSecurityInfo(const_cast(path.value().c_str()), SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, new_dacl, NULL); LocalFree(security_descriptor); LocalFree(new_dacl); return rc == ERROR_SUCCESS; } // Gets a blob indicating the permission information for |path|. // |length| is the length of the blob. Zero on failure. // Returns the blob pointer, or NULL on failure. void* GetPermissionInfo(const FilePath& path, size_t* length) { DCHECK(length != NULL); *length = 0; PACL dacl = NULL; PSECURITY_DESCRIPTOR security_descriptor; if (GetNamedSecurityInfo(const_cast(path.value().c_str()), SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &dacl, NULL, &security_descriptor) != ERROR_SUCCESS) { return NULL; } DCHECK(dacl != NULL); *length = sizeof(PSECURITY_DESCRIPTOR) + dacl->AclSize; PermissionInfo* info = reinterpret_cast(new char[*length]); info->security_descriptor = security_descriptor; memcpy(&info->dacl, dacl, dacl->AclSize); return info; } // Restores the permission information for |path|, given the blob retrieved // using |GetPermissionInfo()|. // |info| is the pointer to the blob. // |length| is the length of the blob. // Either |info| or |length| may be NULL/0, in which case nothing happens. bool RestorePermissionInfo(const FilePath& path, void* info, size_t length) { if (!info || !length) return false; PermissionInfo* perm = reinterpret_cast(info); DWORD rc = SetNamedSecurityInfo(const_cast(path.value().c_str()), SE_FILE_OBJECT, DACL_SECURITY_INFORMATION, NULL, NULL, &perm->dacl, NULL); LocalFree(perm->security_descriptor); char* char_array = reinterpret_cast(info); delete [] char_array; return rc == ERROR_SUCCESS; } } // namespace bool DieFileDie(const FilePath& file, bool recurse) { // It turns out that to not induce flakiness a long timeout is needed. const int kIterations = 25; const TimeDelta kTimeout = TimeDelta::FromSeconds(10) / kIterations; if (!PathExists(file)) return true; // Sometimes Delete fails, so try a few more times. Divide the timeout // into short chunks, so that if a try succeeds, we won't delay the test // for too long. for (int i = 0; i < kIterations; ++i) { if (DeleteFile(file, recurse)) return true; PlatformThread::Sleep(kTimeout); } return false; } bool EvictFileFromSystemCache(const FilePath& file) { // Request exclusive access to the file and overwrite it with no buffering. base::win::ScopedHandle file_handle( CreateFile(file.value().c_str(), GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, FILE_FLAG_NO_BUFFERING, NULL)); if (!file_handle.IsValid()) return false; // Get some attributes to restore later. BY_HANDLE_FILE_INFORMATION bhi = {0}; CHECK(::GetFileInformationByHandle(file_handle.Get(), &bhi)); // Execute in chunks. It could be optimized. We want to do few of these since // these operations will be slow without the cache. // Allocate a buffer for the reads and the writes. char* buffer = reinterpret_cast(VirtualAlloc(NULL, kOneMB, MEM_COMMIT | MEM_RESERVE, PAGE_READWRITE)); // If the file size isn't a multiple of kOneMB, we'll need special // processing. bool file_is_aligned = true; int total_bytes = 0; DWORD bytes_read, bytes_written; for (;;) { bytes_read = 0; ::ReadFile(file_handle.Get(), buffer, kOneMB, &bytes_read, NULL); if (bytes_read == 0) break; if (bytes_read < kOneMB) { // Zero out the remaining part of the buffer. // WriteFile will fail if we provide a buffer size that isn't a // sector multiple, so we'll have to write the entire buffer with // padded zeros and then use SetEndOfFile to truncate the file. ZeroMemory(buffer + bytes_read, kOneMB - bytes_read); file_is_aligned = false; } // Move back to the position we just read from. // Note that SetFilePointer will also fail if total_bytes isn't sector // aligned, but that shouldn't happen here. DCHECK_EQ(total_bytes % kOneMB, 0); SetFilePointer(file_handle.Get(), total_bytes, NULL, FILE_BEGIN); if (!::WriteFile(file_handle.Get(), buffer, kOneMB, &bytes_written, NULL) || bytes_written != kOneMB) { BOOL freed = VirtualFree(buffer, 0, MEM_RELEASE); DCHECK(freed); NOTREACHED(); return false; } total_bytes += bytes_read; // If this is false, then we just processed the last portion of the file. if (!file_is_aligned) break; } BOOL freed = VirtualFree(buffer, 0, MEM_RELEASE); DCHECK(freed); if (!file_is_aligned) { // The size of the file isn't a multiple of 1 MB, so we'll have // to open the file again, this time without the FILE_FLAG_NO_BUFFERING // flag and use SetEndOfFile to mark EOF. file_handle.Set(NULL); file_handle.Set(CreateFile(file.value().c_str(), GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL)); CHECK_NE(SetFilePointer(file_handle.Get(), total_bytes, NULL, FILE_BEGIN), INVALID_SET_FILE_POINTER); CHECK(::SetEndOfFile(file_handle.Get())); } // Restore the file attributes. CHECK(::SetFileTime(file_handle.Get(), &bhi.ftCreationTime, &bhi.ftLastAccessTime, &bhi.ftLastWriteTime)); return true; } // Checks if the volume supports Alternate Data Streams. This is required for // the Zone Identifier implementation. bool VolumeSupportsADS(const FilePath& path) { wchar_t drive[MAX_PATH] = {0}; wcscpy_s(drive, MAX_PATH, path.value().c_str()); if (!PathStripToRootW(drive)) return false; DWORD fs_flags = 0; if (!GetVolumeInformationW(drive, NULL, 0, 0, NULL, &fs_flags, NULL, 0)) return false; if (fs_flags & FILE_NAMED_STREAMS) return true; return false; } // Return whether the ZoneIdentifier is correctly set to "Internet" (3) // Only returns a valid result when called from same process as the // one that (was supposed to have) set the zone identifier. bool HasInternetZoneIdentifier(const FilePath& full_path) { FilePath zone_path(full_path.value() + L":Zone.Identifier"); std::string zone_path_contents; if (!ReadFileToString(zone_path, &zone_path_contents)) return false; std::vector lines; // This call also trims whitespaces, including carriage-returns (\r). SplitString(zone_path_contents, '\n', &lines); switch (lines.size()) { case 3: // optional empty line at end of file: if (!lines[2].empty()) return false; // fall through: case 2: return lines[0] == "[ZoneTransfer]" && lines[1] == "ZoneId=3"; default: return false; } } bool MakeFileUnreadable(const FilePath& path) { return DenyFilePermission(path, GENERIC_READ); } bool MakeFileUnwritable(const FilePath& path) { return DenyFilePermission(path, GENERIC_WRITE); } FilePermissionRestorer::FilePermissionRestorer(const FilePath& path) : path_(path), info_(NULL), length_(0) { info_ = GetPermissionInfo(path_, &length_); DCHECK(info_ != NULL); DCHECK_NE(0u, length_); } FilePermissionRestorer::~FilePermissionRestorer() { if (!RestorePermissionInfo(path_, info_, length_)) NOTREACHED(); } } // namespace base