Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp675596pxx; Thu, 29 Oct 2020 11:40:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwYS/yjbdgFC6VBQUJwUluhZVRtoDGRQQ2+x+TyjZ8NW1P12ppZuVlXFeDgFwkkQOnd3PC1 X-Received: by 2002:a17:906:d89:: with SMTP id m9mr5668212eji.18.1603996826858; Thu, 29 Oct 2020 11:40:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603996826; cv=none; d=google.com; s=arc-20160816; b=1KRRKn9BS58Wxl0GnMhPrp7ZiXDekATKpkljABxdPyI7TosvXOsDTlhZg3padY8SRV oCqdAgJYeDJOxkyTxIWZNf9HhF4MpCZAvJoJuBuRVzW/qVKaFsu79K7KAV7Z5i9t1DL/ HahaTaGjT6uJxT1M3ZJO6zgms8La682GT8HhqSu46StZ6gaeFA8srEbCbMGquTnvAQtP yNnyFq1VExzFQCWiPghGCR1GAQbwvzyAZXfwVmO9LrG8bPbKx+RzyTR4BqJnAXpKPj1Y eNKKsUG/K4YI6nGxDqGk8QlkSUiKvUHIe9/9y89udPqOFDT/kaV4p5+EvtIZLD3HJ18I wpaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=XBVdT16KbfHWRwy5uoPg+dPDIbhzWcWjtjwaDApZzko=; b=Fgogszu91xp7V9U7guiS+KFzOU39uqwhdto2DrO96ooKk1X8zhjmPbR0s3/BtrSts+ aPiV8SbFiq+z5oi7sGMqOvp6uxY5BtQgpM6W4Nw8RDC/tzX9Fw2PkbLDmnf9w3vRFamc Xxt/iXn5EtdwVRqU2M6pzf7GAVGSx0NV7MWZif+HOa/uaiIVgT4BYGvgY4s4i2AJLSTV vTE0w71ZHBilscPJdlAyQ7Gp4QVFTJckf/AMlyx7LZMeZSRkLoZJuI87qvddhz6fhCNZ 4SD/9jZ0LZOnM9Ug9NQrGxFe6XmcNVYgbInxGN1X8rqc2sDJf+3im3k3ewYfPtc6/sl5 1lMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=pn0Q8NqB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u11si2613867edt.221.2020.10.29.11.40.04; Thu, 29 Oct 2020 11:40:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=pn0Q8NqB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725973AbgJ2Sf5 (ORCPT + 99 others); Thu, 29 Oct 2020 14:35:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47464 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725916AbgJ2Sfy (ORCPT ); Thu, 29 Oct 2020 14:35:54 -0400 Received: from mail-wr1-x444.google.com (mail-wr1-x444.google.com [IPv6:2a00:1450:4864:20::444]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B836C0613CF; Thu, 29 Oct 2020 11:35:53 -0700 (PDT) Received: by mail-wr1-x444.google.com with SMTP id b8so3918156wrn.0; Thu, 29 Oct 2020 11:35:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=XBVdT16KbfHWRwy5uoPg+dPDIbhzWcWjtjwaDApZzko=; b=pn0Q8NqBI7hhMfQ4mVkAJUHqR2bomvUWrQS9SNsqmE5BwK8gkSJwO24vTTm+PXUwNi 4IaAC0lhwWqcRMl2D4VSxcU3Co+K5exvzGKsZVAuttifjaw6uyIYjY+eAyGXx/pi97No zIyqGtxL91Wxyg0Zw8sCVMW8YaCs05yFUg4VjxZ5Vy7AXHVLTgIPTqmICpHMBXZF6wVh CXUV9CCjZC9r5oUYnNDF8cGVERDdqtRsKLExJH8mxGpYXkqt1OZEa6GkzQuaUvFgx+C6 nyUZEiuFWzRWhgmFeiBjpGOnskGbe5lJMP6HXz8ar5l8vjhKrfnwAIwOIWZfID8WXiAN 95PA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=XBVdT16KbfHWRwy5uoPg+dPDIbhzWcWjtjwaDApZzko=; b=dFtuFni8PLHxHHdjtl5cnykq9BrPBf0RbYSOjWyf5K1fVkxTY8pSBvThAXYggyplKU 5Ddm2kYc5iEoeWny6llzwmNZK+ALIwEXqonSm76zcYFycuSH2cZ3rFs++AxLgqcUw49u ALcZ2WCKLUaqNcJl8xEbzwVChwhwHFekm5Qs3T8Uph8EHGfwkWilSsOZJ4kR6qSBMlOC vopVv3vx8l6Xl8oW1thuIgYM2FAqOqqV1Q0H6AH6mSDD/kA5NbiaRQYa9XKgsw0ivETp 0nbiAA7uTHMHlfEyi6gS153396gJkehpudacEFe1uRexzXtnXwcpxamPBH5kHWuVjv/7 8Adg== X-Gm-Message-State: AOAM531eaB3YpykdoApQ0V11oMap5/1D3+fLvrDwUOnq+5BWWTARQKZi 5Z67ojwnjZnSEvyR3PxoL/g= X-Received: by 2002:adf:ed92:: with SMTP id c18mr3518748wro.363.1603996552070; Thu, 29 Oct 2020 11:35:52 -0700 (PDT) Received: from nogikh.c.googlers.com.com (88.140.78.34.bc.googleusercontent.com. [34.78.140.88]) by smtp.gmail.com with ESMTPSA id f4sm5800982wrq.54.2020.10.29.11.35.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 29 Oct 2020 11:35:51 -0700 (PDT) From: Aleksandr Nogikh To: jmorris@namei.org, serge@hallyn.com, akinobu.mita@gmail.com Cc: andreyknvl@google.com, dvyukov@google.com, elver@google.com, glider@google.com, keescook@google.com, casey@schaufler-ca.com, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Aleksandr Nogikh Subject: [PATCH v3 2/2] docs: add fail_lsm_hooks info to fault-injection.rst Date: Thu, 29 Oct 2020 18:35:26 +0000 Message-Id: <20201029183526.2131776-3-aleksandrnogikh@gmail.com> X-Mailer: git-send-email 2.29.1.341.ge80a0c044ae-goog In-Reply-To: <20201029183526.2131776-1-aleksandrnogikh@gmail.com> References: <20201029183526.2131776-1-aleksandrnogikh@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aleksandr Nogikh Describe fail_lsm_hooks fault injection capability. Signed-off-by: Aleksandr Nogikh --- v2: - Added this commit. --- Documentation/fault-injection/fault-injection.rst | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Documentation/fault-injection/fault-injection.rst b/Documentation/fault-injection/fault-injection.rst index 31ecfe44e5b4..48705adfbc18 100644 --- a/Documentation/fault-injection/fault-injection.rst +++ b/Documentation/fault-injection/fault-injection.rst @@ -48,6 +48,12 @@ Available fault injection capabilities status code is NVME_SC_INVALID_OPCODE with no retry. The status code and retry flag can be set via the debugfs. +- fail_lsm_hooks + + injects failures into LSM hooks. When a fault is injected, actual hooks + are not executed and a code from /sys/kernel/debug/fail_lsm_hooks/retval + is returned (the default value is -EACCES). + Configure fault-injection capabilities behavior ----------------------------------------------- -- 2.29.1.341.ge80a0c044ae-goog