twx-linux/security/apparmor
Guenter Roeck d60839a73a apparmor: fix policy_unpack_test on big endian systems
[ Upstream commit 98c0cc48e27e9d269a3e4db2acd72b486c88ec77 ]

policy_unpack_test fails on big endian systems because data byte order
is expected to be little endian but is generated in host byte order.
This results in test failures such as:

 # policy_unpack_test_unpack_array_with_null_name: EXPECTATION FAILED at security/apparmor/policy_unpack_test.c:150
    Expected array_size == (u16)16, but
        array_size == 4096 (0x1000)
        (u16)16 == 16 (0x10)
    # policy_unpack_test_unpack_array_with_null_name: pass:0 fail:1 skip:0 total:1
    not ok 3 policy_unpack_test_unpack_array_with_null_name
    # policy_unpack_test_unpack_array_with_name: EXPECTATION FAILED at security/apparmor/policy_unpack_test.c:164
    Expected array_size == (u16)16, but
        array_size == 4096 (0x1000)
        (u16)16 == 16 (0x10)
    # policy_unpack_test_unpack_array_with_name: pass:0 fail:1 skip:0 total:1

Add the missing endianness conversions when generating test data.

Fixes: 4d944bcd4e73 ("apparmor: add AppArmor KUnit tests for policy unpack")
Cc: Brendan Higgins <brendanhiggins@google.com>
Cc: Kees Cook <keescook@chromium.org>
Signed-off-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-09-04 13:28:31 +02:00
..
include ima: Avoid blocking in RCU read-side critical section 2024-07-11 12:49:18 +02:00
.gitignore .gitignore: add SPDX License Identifier 2020-03-25 11:50:48 +01:00
apparmorfs.c apparmor: Fix move_mount mediation by detecting if source is detached 2024-01-10 17:16:52 +01:00
audit.c ima: Avoid blocking in RCU read-side critical section 2024-07-11 12:49:18 +02:00
capability.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
crypto.c apparmor: Return directly after a failed kzalloc() in two functions 2023-07-06 10:58:49 -07:00
domain.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
file.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
ipc.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
Kconfig + Features 2022-12-14 13:42:09 -08:00
label.c apparmor: remove useless static inline functions 2022-10-24 22:35:11 -07:00
lib.c apparmor: fix possible memory leak in unpack_trans_table 2024-01-25 15:35:54 -08:00
lsm.c apparmor: Fix null pointer deref when receiving skb during sock creation 2024-08-03 08:54:38 +02:00
Makefile + Features 2022-12-14 13:42:09 -08:00
match.c apparmor: Add __init annotation to aa_{setup/teardown}_dfa_engine() 2022-11-01 21:17:26 -07:00
mount.c apparmor: Fix move_mount mediation by detecting if source is detached 2024-01-10 17:16:52 +01:00
net.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
nulldfa.in
path.c security: apparmor: delete repeated words in comments 2021-02-07 04:15:46 -08:00
policy_compat.c + Bug Fixes 2023-07-07 09:55:31 -07:00
policy_ns.c apparmor: Fix memleak in alloc_ns() 2022-11-01 05:32:13 -07:00
policy_unpack_test.c apparmor: fix policy_unpack_test on big endian systems 2024-09-04 13:28:31 +02:00
policy_unpack.c apparmor: use kvfree_sensitive to free data->data 2024-08-03 08:54:16 +02:00
policy.c apparmor: use kvfree_sensitive to free data->data 2024-08-03 08:54:16 +02:00
procattr.c apparmor: fix obsoleted comments for aa_getprocattr() and audit_resource() 2022-10-24 22:35:23 -07:00
resource.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00
secid.c apparmor: fix kernel-doc complaints 2023-01-10 10:04:35 -08:00
stacksplitdfa.in
task.c apparmor: pass cred through to audit info. 2023-11-28 17:20:07 +00:00