Home
last modified time | relevance | path

Searched full:enforcing (Results 1 – 25 of 96) sorted by relevance

1234

/linux/security/selinux/
H A Dstatus.c56 status->enforcing = enforcing_enabled(); in selinux_kernel_status_page()
77 * It updates status of the current enforcing/permissive mode.
79 void selinux_status_update_setenforce(bool enforcing) in selinux_status_update_setenforce() argument
90 status->enforcing = enforcing ? 1 : 0; in selinux_status_update_setenforce()
H A DKconfig35 unless you specify enforcing=1 on the kernel command line. You
36 can interactively toggle the kernel between enforcing mode and
H A Dima.c27 buf_len = strlen("initialized=0;enforcing=0;checkreqprot=0;") + 1; in selinux_ima_collect_state()
43 rc = strlcat(buf, "enforcing", buf_len); in selinux_ima_collect_state()
/linux/security/selinux/include/
H A Dsecurity.h96 bool enforcing; member
127 return READ_ONCE(selinux_state.enforcing); in enforcing_enabled()
132 WRITE_ONCE(selinux_state.enforcing, value); in enforcing_set()
394 u32 enforcing; /* current setting of enforcing mode */
402 extern void selinux_status_update_setenforce(bool enforcing);
388 u32 enforcing; /* current setting of enforcing mode */ global() member
/linux/tools/perf/Documentation/
H A Dsecurity.txt98 # enforcing - SELinux security policy is enforced.
99 # permissive - SELinux prints warnings instead of enforcing.
121 11. Turn SELinux into Enforcing mode:
125 Enforcing
/linux/Documentation/admin-guide/LSM/
H A Dipe.rst210 enforcing the configurable policies at startup, around reading and
298 Deploying a policy will *not* cause IPE to start enforcing the policy. IPE will
332 enforced. This allows users to test policies before enforcing them.
350 …type=1420 audit(1653364370.067:61): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2241 comm="ld-lin…
354 …type=1420 audit(1653364735.161:64): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2472 comm="mmap_t…
375 | enforcing | integer | No | The current IPE enforcing state 1 is in enforcing mode, 0 is…
504 …type=1404 audit(1653425689.008:55): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 ena…
508 …type=1404 audit(1653425689.008:55): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 ena…
519 | enforcing | integer | No | The enforcing state IPE is being switched to, 1 is in en…
521 … old_enforcing | integer | No | The enforcing state IPE is being switched from, 1 is in
/linux/tools/testing/selftests/kexec/
H A Dkexec_common_lib.sh69 # /proc/device-tree/ibm,secureboot/os-secureboot-enforcing
73 local secure_boot_file="/proc/device-tree/ibm,secureboot/os-secureboot-enforcing"
/linux/security/integrity/ima/
H A Dima_main.c483 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_file_mmap()
582 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_bprm_check()
613 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_creds_check()
631 * enforcing file integrity is left up to the discretion of the script
635 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_bprm_creds_for_exec()
660 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_file_check()
911 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_post_read_file()
999 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_post_load_data()
/linux/security/lockdown/
H A DKconfig2 bool "Basic module for enforcing kernel lockdown"
/linux/security/landlock/
H A DKconfig10 themselves (and their future children) by gradually enforcing
H A Dtsync.c25 * Shared state between multiple threads which are enforcing Landlock rulesets
73 * all-or-nothing semantics for enforcing the new Landlock domain.
H A Ddomain.c114 * The current task is referenced as the domain that is enforcing the
/linux/security/ipe/
H A Daudit.c145 audit_log_format(ab, "ipe_op=%s ipe_hook=%s enforcing=%d pid=%d comm=", in ipe_audit_match()
272 "enforcing=%d old_enforcing=%d auid=%u ses=%u" in ipe_audit_enforce()
/linux/security/tomoyo/
H A DKconfig53 enforcing mode from the beginning, you can reduce the possibility of
H A Dcommon.c19 [TOMOYO_CONFIG_ENFORCING] = "enforcing"
2190 * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the
2192 * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise.
2320 * Waits for access requests which violated policy in enforcing mode.
2333 * tomoyo_read_query - Read access requests which violated policy in enforcing mode.
2453 [TOMOYO_STAT_POLICY_ENFORCING] = "violation in enforcing mode:",
/linux/drivers/hv/
H A DKconfig72 # The hypervisor interface operates on 4k pages. Enforcing it here
/linux/security/loadpin/
H A Dloadpin.c115 * enforcing mode. Otherwise, allow the root to be reestablished. in loadpin_sb_free_security()
157 * been unmounted while we are not in enforcing mode. Otherwise, it in loadpin_check()
/linux/kernel/module/
H A Dsigning.c96 * without a valid signature on them, but if we're not enforcing, in module_sig_check()
/linux/Documentation/core-api/
H A Dprotection-keys.rst7 Memory Protection Keys provide a mechanism for enforcing page-based
/linux/kernel/
H A DKconfig.preempt99 preemptible priority-inheritance aware variants, enforcing
/linux/Documentation/arch/powerpc/
H A Ddexcr.rst119 the hypervisor is enforcing the aspect be set. To see the true DEXCR state
/linux/Documentation/userspace-api/
H A Dcheck_exec.rst87 arbitrary code execution e.g., by enforcing a write xor execute policy.
/linux/Documentation/security/
H A Dlandlock.rst42 * Computation related to Landlock operations (e.g. enforcing a ruleset) shall
/linux/rust/kernel/drm/
H A Dioctl.rs134 // FIXME: Currently there is nothing enforcing that the types of the
/linux/Documentation/rust/
H A Dtesting.rst65 (thus enforcing they are kept in sync with the code they document) and as well

1234