// SPDX-License-Identifier: GPL-2.0-only /* * KUnit tests for AppArmor's policy unpack. */ #include #include #include "include/policy.h" #include "include/policy_unpack.h" #define TEST_STRING_NAME "TEST_STRING" #define TEST_STRING_DATA "testing" #define TEST_STRING_BUF_OFFSET \ (3 + strlen(TEST_STRING_NAME) + 1) #define TEST_U32_NAME "U32_TEST" #define TEST_U32_DATA ((u32)0x01020304) #define TEST_NAMED_U32_BUF_OFFSET \ (TEST_STRING_BUF_OFFSET + 3 + strlen(TEST_STRING_DATA) + 1) #define TEST_U32_BUF_OFFSET \ (TEST_NAMED_U32_BUF_OFFSET + 3 + strlen(TEST_U32_NAME) + 1) #define TEST_U16_OFFSET (TEST_U32_BUF_OFFSET + 3) #define TEST_U16_DATA ((u16)(TEST_U32_DATA >> 16)) #define TEST_U64_NAME "U64_TEST" #define TEST_U64_DATA ((u64)0x0102030405060708) #define TEST_NAMED_U64_BUF_OFFSET (TEST_U32_BUF_OFFSET + sizeof(u32) + 1) #define TEST_U64_BUF_OFFSET \ (TEST_NAMED_U64_BUF_OFFSET + 3 + strlen(TEST_U64_NAME) + 1) #define TEST_BLOB_NAME "BLOB_TEST" #define TEST_BLOB_DATA "\xde\xad\x00\xbe\xef" #define TEST_BLOB_DATA_SIZE (ARRAY_SIZE(TEST_BLOB_DATA)) #define TEST_NAMED_BLOB_BUF_OFFSET (TEST_U64_BUF_OFFSET + sizeof(u64) + 1) #define TEST_BLOB_BUF_OFFSET \ (TEST_NAMED_BLOB_BUF_OFFSET + 3 + strlen(TEST_BLOB_NAME) + 1) #define TEST_ARRAY_NAME "ARRAY_TEST" #define TEST_ARRAY_SIZE 16 #define TEST_NAMED_ARRAY_BUF_OFFSET \ (TEST_BLOB_BUF_OFFSET + 5 + TEST_BLOB_DATA_SIZE) #define TEST_ARRAY_BUF_OFFSET \ (TEST_NAMED_ARRAY_BUF_OFFSET + 3 + strlen(TEST_ARRAY_NAME) + 1) MODULE_IMPORT_NS(EXPORTED_FOR_KUNIT_TESTING); struct policy_unpack_fixture { struct aa_ext *e; size_t e_size; }; static struct aa_ext *build_aa_ext_struct(struct policy_unpack_fixture *puf, struct kunit *test, size_t buf_size) { char *buf; struct aa_ext *e; buf = kunit_kzalloc(test, buf_size, GFP_USER); KUNIT_EXPECT_NOT_ERR_OR_NULL(test, buf); e = kunit_kmalloc(test, sizeof(*e), GFP_USER); KUNIT_EXPECT_NOT_ERR_OR_NULL(test, e); e->start = buf; e->end = e->start + buf_size; e->pos = e->start; *buf = AA_NAME; *(buf + 1) = strlen(TEST_STRING_NAME) + 1; strscpy(buf + 3, TEST_STRING_NAME, e->end - (void *)(buf + 3)); buf = e->start + TEST_STRING_BUF_OFFSET; *buf = AA_STRING; *(buf + 1) = strlen(TEST_STRING_DATA) + 1; strscpy(buf + 3, TEST_STRING_DATA, e->end - (void *)(buf + 3)); buf = e->start + TEST_NAMED_U32_BUF_OFFSET; *buf = AA_NAME; *(buf + 1) = strlen(TEST_U32_NAME) + 1; strscpy(buf + 3, TEST_U32_NAME, e->end - (void *)(buf + 3)); *(buf + 3 + strlen(TEST_U32_NAME) + 1) = AA_U32; *((u32 *)(buf + 3 + strlen(TEST_U32_NAME) + 2)) = TEST_U32_DATA; buf = e->start + TEST_NAMED_U64_BUF_OFFSET; *buf = AA_NAME; *(buf + 1) = strlen(TEST_U64_NAME) + 1; strscpy(buf + 3, TEST_U64_NAME, e->end - (void *)(buf + 3)); *(buf + 3 + strlen(TEST_U64_NAME) + 1) = AA_U64; *((u64 *)(buf + 3 + strlen(TEST_U64_NAME) + 2)) = TEST_U64_DATA; buf = e->start + TEST_NAMED_BLOB_BUF_OFFSET; *buf = AA_NAME; *(buf + 1) = strlen(TEST_BLOB_NAME) + 1; strscpy(buf + 3, TEST_BLOB_NAME, e->end - (void *)(buf + 3)); *(buf + 3 + strlen(TEST_BLOB_NAME) + 1) = AA_BLOB; *(buf + 3 + strlen(TEST_BLOB_NAME) + 2) = TEST_BLOB_DATA_SIZE; memcpy(buf + 3 + strlen(TEST_BLOB_NAME) + 6, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE); buf = e->start + TEST_NAMED_ARRAY_BUF_OFFSET; *buf = AA_NAME; *(buf + 1) = strlen(TEST_ARRAY_NAME) + 1; strscpy(buf + 3, TEST_ARRAY_NAME, e->end - (void *)(buf + 3)); *(buf + 3 + strlen(TEST_ARRAY_NAME) + 1) = AA_ARRAY; *((u16 *)(buf + 3 + strlen(TEST_ARRAY_NAME) + 2)) = TEST_ARRAY_SIZE; return e; } static int policy_unpack_test_init(struct kunit *test) { size_t e_size = TEST_ARRAY_BUF_OFFSET + sizeof(u16) + 1; struct policy_unpack_fixture *puf; puf = kunit_kmalloc(test, sizeof(*puf), GFP_USER); KUNIT_EXPECT_NOT_ERR_OR_NULL(test, puf); puf->e_size = e_size; puf->e = build_aa_ext_struct(puf, test, e_size); test->priv = puf; return 0; } static void policy_unpack_test_inbounds_when_inbounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; KUNIT_EXPECT_TRUE(test, aa_inbounds(puf->e, 0)); KUNIT_EXPECT_TRUE(test, aa_inbounds(puf->e, puf->e_size / 2)); KUNIT_EXPECT_TRUE(test, aa_inbounds(puf->e, puf->e_size)); } static void policy_unpack_test_inbounds_when_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; KUNIT_EXPECT_FALSE(test, aa_inbounds(puf->e, puf->e_size + 1)); } static void policy_unpack_test_unpack_array_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; u16 array_size = 0; puf->e->pos += TEST_ARRAY_BUF_OFFSET; KUNIT_EXPECT_TRUE(test, aa_unpack_array(puf->e, NULL, &array_size)); KUNIT_EXPECT_EQ(test, array_size, (u16)TEST_ARRAY_SIZE); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_ARRAY_BUF_OFFSET + sizeof(u16) + 1); } static void policy_unpack_test_unpack_array_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_ARRAY_NAME; u16 array_size = 0; puf->e->pos += TEST_NAMED_ARRAY_BUF_OFFSET; KUNIT_EXPECT_TRUE(test, aa_unpack_array(puf->e, name, &array_size)); KUNIT_EXPECT_EQ(test, array_size, (u16)TEST_ARRAY_SIZE); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_ARRAY_BUF_OFFSET + sizeof(u16) + 1); } static void policy_unpack_test_unpack_array_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_ARRAY_NAME; u16 array_size; puf->e->pos += TEST_NAMED_ARRAY_BUF_OFFSET; puf->e->end = puf->e->start + TEST_ARRAY_BUF_OFFSET + sizeof(u16); KUNIT_EXPECT_FALSE(test, aa_unpack_array(puf->e, name, &array_size)); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_NAMED_ARRAY_BUF_OFFSET); } static void policy_unpack_test_unpack_blob_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *blob = NULL; size_t size; puf->e->pos += TEST_BLOB_BUF_OFFSET; size = aa_unpack_blob(puf->e, &blob, NULL); KUNIT_ASSERT_EQ(test, size, TEST_BLOB_DATA_SIZE); KUNIT_EXPECT_TRUE(test, memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); } static void policy_unpack_test_unpack_blob_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *blob = NULL; size_t size; puf->e->pos += TEST_NAMED_BLOB_BUF_OFFSET; size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME); KUNIT_ASSERT_EQ(test, size, TEST_BLOB_DATA_SIZE); KUNIT_EXPECT_TRUE(test, memcmp(blob, TEST_BLOB_DATA, TEST_BLOB_DATA_SIZE) == 0); } static void policy_unpack_test_unpack_blob_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *blob = NULL; void *start; int size; puf->e->pos += TEST_NAMED_BLOB_BUF_OFFSET; start = puf->e->pos; puf->e->end = puf->e->start + TEST_BLOB_BUF_OFFSET + TEST_BLOB_DATA_SIZE - 1; size = aa_unpack_blob(puf->e, &blob, TEST_BLOB_NAME); KUNIT_EXPECT_EQ(test, size, 0); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, start); } static void policy_unpack_test_unpack_str_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char *string = NULL; size_t size; puf->e->pos += TEST_STRING_BUF_OFFSET; size = aa_unpack_str(puf->e, &string, NULL); KUNIT_EXPECT_EQ(test, size, strlen(TEST_STRING_DATA) + 1); KUNIT_EXPECT_STREQ(test, string, TEST_STRING_DATA); } static void policy_unpack_test_unpack_str_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char *string = NULL; size_t size; size = aa_unpack_str(puf->e, &string, TEST_STRING_NAME); KUNIT_EXPECT_EQ(test, size, strlen(TEST_STRING_DATA) + 1); KUNIT_EXPECT_STREQ(test, string, TEST_STRING_DATA); } static void policy_unpack_test_unpack_str_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char *string = NULL; void *start = puf->e->pos; int size; puf->e->end = puf->e->pos + TEST_STRING_BUF_OFFSET + strlen(TEST_STRING_DATA) - 1; size = aa_unpack_str(puf->e, &string, TEST_STRING_NAME); KUNIT_EXPECT_EQ(test, size, 0); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, start); } static void policy_unpack_test_unpack_strdup_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *string = NULL; size_t size; puf->e->pos += TEST_STRING_BUF_OFFSET; size = aa_unpack_strdup(puf->e, &string, NULL); KUNIT_EXPECT_EQ(test, size, strlen(TEST_STRING_DATA) + 1); KUNIT_EXPECT_FALSE(test, ((uintptr_t)puf->e->start <= (uintptr_t)string) && ((uintptr_t)string <= (uintptr_t)puf->e->end)); KUNIT_EXPECT_STREQ(test, string, TEST_STRING_DATA); } static void policy_unpack_test_unpack_strdup_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *string = NULL; size_t size; size = aa_unpack_strdup(puf->e, &string, TEST_STRING_NAME); KUNIT_EXPECT_EQ(test, size, strlen(TEST_STRING_DATA) + 1); KUNIT_EXPECT_FALSE(test, ((uintptr_t)puf->e->start <= (uintptr_t)string) && ((uintptr_t)string <= (uintptr_t)puf->e->end)); KUNIT_EXPECT_STREQ(test, string, TEST_STRING_DATA); } static void policy_unpack_test_unpack_strdup_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; void *start = puf->e->pos; char *string = NULL; int size; puf->e->end = puf->e->pos + TEST_STRING_BUF_OFFSET + strlen(TEST_STRING_DATA) - 1; size = aa_unpack_strdup(puf->e, &string, TEST_STRING_NAME); KUNIT_EXPECT_EQ(test, size, 0); KUNIT_EXPECT_NULL(test, string); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, start); } static void policy_unpack_test_unpack_nameX_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success; puf->e->pos += TEST_U32_BUF_OFFSET; success = aa_unpack_nameX(puf->e, AA_U32, NULL); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U32_BUF_OFFSET + 1); } static void policy_unpack_test_unpack_nameX_with_wrong_code(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success; puf->e->pos += TEST_U32_BUF_OFFSET; success = aa_unpack_nameX(puf->e, AA_BLOB, NULL); KUNIT_EXPECT_FALSE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U32_BUF_OFFSET); } static void policy_unpack_test_unpack_nameX_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_U32_NAME; bool success; puf->e->pos += TEST_NAMED_U32_BUF_OFFSET; success = aa_unpack_nameX(puf->e, AA_U32, name); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U32_BUF_OFFSET + 1); } static void policy_unpack_test_unpack_nameX_with_wrong_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; static const char name[] = "12345678"; bool success; puf->e->pos += TEST_NAMED_U32_BUF_OFFSET; success = aa_unpack_nameX(puf->e, AA_U32, name); KUNIT_EXPECT_FALSE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_NAMED_U32_BUF_OFFSET); } static void policy_unpack_test_unpack_u16_chunk_basic(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *chunk = NULL; size_t size; puf->e->pos += TEST_U16_OFFSET; /* * WARNING: For unit testing purposes, we're pushing puf->e->end past * the end of the allocated memory. Doing anything other than comparing * memory addresses is dangerous. */ puf->e->end += TEST_U16_DATA; size = aa_unpack_u16_chunk(puf->e, &chunk); KUNIT_EXPECT_PTR_EQ(test, chunk, puf->e->start + TEST_U16_OFFSET + 2); KUNIT_EXPECT_EQ(test, size, TEST_U16_DATA); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, (chunk + TEST_U16_DATA)); } static void policy_unpack_test_unpack_u16_chunk_out_of_bounds_1( struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *chunk = NULL; size_t size; puf->e->pos = puf->e->end - 1; size = aa_unpack_u16_chunk(puf->e, &chunk); KUNIT_EXPECT_EQ(test, size, 0); KUNIT_EXPECT_NULL(test, chunk); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->end - 1); } static void policy_unpack_test_unpack_u16_chunk_out_of_bounds_2( struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; char *chunk = NULL; size_t size; puf->e->pos += TEST_U16_OFFSET; /* * WARNING: For unit testing purposes, we're pushing puf->e->end past * the end of the allocated memory. Doing anything other than comparing * memory addresses is dangerous. */ puf->e->end = puf->e->pos + TEST_U16_DATA - 1; size = aa_unpack_u16_chunk(puf->e, &chunk); KUNIT_EXPECT_EQ(test, size, 0); KUNIT_EXPECT_NULL(test, chunk); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U16_OFFSET); } static void policy_unpack_test_unpack_u32_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success; u32 data = 0; puf->e->pos += TEST_U32_BUF_OFFSET; success = aa_unpack_u32(puf->e, &data, NULL); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_EQ(test, data, TEST_U32_DATA); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U32_BUF_OFFSET + sizeof(u32) + 1); } static void policy_unpack_test_unpack_u32_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_U32_NAME; bool success; u32 data = 0; puf->e->pos += TEST_NAMED_U32_BUF_OFFSET; success = aa_unpack_u32(puf->e, &data, name); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_EQ(test, data, TEST_U32_DATA); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U32_BUF_OFFSET + sizeof(u32) + 1); } static void policy_unpack_test_unpack_u32_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_U32_NAME; bool success; u32 data = 0; puf->e->pos += TEST_NAMED_U32_BUF_OFFSET; puf->e->end = puf->e->start + TEST_U32_BUF_OFFSET + sizeof(u32); success = aa_unpack_u32(puf->e, &data, name); KUNIT_EXPECT_FALSE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_NAMED_U32_BUF_OFFSET); } static void policy_unpack_test_unpack_u64_with_null_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success; u64 data = 0; puf->e->pos += TEST_U64_BUF_OFFSET; success = aa_unpack_u64(puf->e, &data, NULL); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_EQ(test, data, TEST_U64_DATA); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64) + 1); } static void policy_unpack_test_unpack_u64_with_name(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_U64_NAME; bool success; u64 data = 0; puf->e->pos += TEST_NAMED_U64_BUF_OFFSET; success = aa_unpack_u64(puf->e, &data, name); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_EQ(test, data, TEST_U64_DATA); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64) + 1); } static void policy_unpack_test_unpack_u64_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; const char name[] = TEST_U64_NAME; bool success; u64 data = 0; puf->e->pos += TEST_NAMED_U64_BUF_OFFSET; puf->e->end = puf->e->start + TEST_U64_BUF_OFFSET + sizeof(u64); success = aa_unpack_u64(puf->e, &data, name); KUNIT_EXPECT_FALSE(test, success); KUNIT_EXPECT_PTR_EQ(test, puf->e->pos, puf->e->start + TEST_NAMED_U64_BUF_OFFSET); } static void policy_unpack_test_unpack_X_code_match(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success = aa_unpack_X(puf->e, AA_NAME); KUNIT_EXPECT_TRUE(test, success); KUNIT_EXPECT_TRUE(test, puf->e->pos == puf->e->start + 1); } static void policy_unpack_test_unpack_X_code_mismatch(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success = aa_unpack_X(puf->e, AA_STRING); KUNIT_EXPECT_FALSE(test, success); KUNIT_EXPECT_TRUE(test, puf->e->pos == puf->e->start); } static void policy_unpack_test_unpack_X_out_of_bounds(struct kunit *test) { struct policy_unpack_fixture *puf = test->priv; bool success; puf->e->pos = puf->e->end; success = aa_unpack_X(puf->e, AA_NAME); KUNIT_EXPECT_FALSE(test, success); } static struct kunit_case apparmor_policy_unpack_test_cases[] = { KUNIT_CASE(policy_unpack_test_inbounds_when_inbounds), KUNIT_CASE(policy_unpack_test_inbounds_when_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_array_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_array_with_name), KUNIT_CASE(policy_unpack_test_unpack_array_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_blob_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_blob_with_name), KUNIT_CASE(policy_unpack_test_unpack_blob_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_nameX_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_nameX_with_wrong_code), KUNIT_CASE(policy_unpack_test_unpack_nameX_with_name), KUNIT_CASE(policy_unpack_test_unpack_nameX_with_wrong_name), KUNIT_CASE(policy_unpack_test_unpack_str_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_str_with_name), KUNIT_CASE(policy_unpack_test_unpack_str_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_strdup_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_strdup_with_name), KUNIT_CASE(policy_unpack_test_unpack_strdup_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_u16_chunk_basic), KUNIT_CASE(policy_unpack_test_unpack_u16_chunk_out_of_bounds_1), KUNIT_CASE(policy_unpack_test_unpack_u16_chunk_out_of_bounds_2), KUNIT_CASE(policy_unpack_test_unpack_u32_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_u32_with_name), KUNIT_CASE(policy_unpack_test_unpack_u32_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_u64_with_null_name), KUNIT_CASE(policy_unpack_test_unpack_u64_with_name), KUNIT_CASE(policy_unpack_test_unpack_u64_out_of_bounds), KUNIT_CASE(policy_unpack_test_unpack_X_code_match), KUNIT_CASE(policy_unpack_test_unpack_X_code_mismatch), KUNIT_CASE(policy_unpack_test_unpack_X_out_of_bounds), {}, }; static struct kunit_suite apparmor_policy_unpack_test_module = { .name = "apparmor_policy_unpack", .init = policy_unpack_test_init, .test_cases = apparmor_policy_unpack_test_cases, }; kunit_test_suite(apparmor_policy_unpack_test_module); MODULE_DESCRIPTION("KUnit tests for AppArmor's policy unpack"); MODULE_LICENSE("GPL");