| /linux/security/selinux/ |
| H A D | status.c | 56 status->enforcing = enforcing_enabled(); in selinux_kernel_status_page() 77 * It updates status of the current enforcing/permissive mode. 79 void selinux_status_update_setenforce(bool enforcing) in selinux_status_update_setenforce() argument 90 status->enforcing = enforcing ? 1 : 0; in selinux_status_update_setenforce()
|
| H A D | Kconfig | 35 unless you specify enforcing=1 on the kernel command line. You 36 can interactively toggle the kernel between enforcing mode and
|
| H A D | ima.c | 27 buf_len = strlen("initialized=0;enforcing=0;checkreqprot=0;") + 1; in selinux_ima_collect_state() 43 rc = strlcat(buf, "enforcing", buf_len); in selinux_ima_collect_state()
|
| /linux/security/selinux/include/ |
| H A D | security.h | 96 bool enforcing; member 127 return READ_ONCE(selinux_state.enforcing); in enforcing_enabled() 132 WRITE_ONCE(selinux_state.enforcing, value); in enforcing_set() 394 u32 enforcing; /* current setting of enforcing mode */ 402 extern void selinux_status_update_setenforce(bool enforcing); 388 u32 enforcing; /* current setting of enforcing mode */ global() member
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 98 # enforcing - SELinux security policy is enforced. 99 # permissive - SELinux prints warnings instead of enforcing. 121 11. Turn SELinux into Enforcing mode: 125 Enforcing
|
| /linux/Documentation/admin-guide/LSM/ |
| H A D | ipe.rst | 210 enforcing the configurable policies at startup, around reading and 298 Deploying a policy will *not* cause IPE to start enforcing the policy. IPE will 332 enforced. This allows users to test policies before enforcing them. 350 …type=1420 audit(1653364370.067:61): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2241 comm="ld-lin… 354 …type=1420 audit(1653364735.161:64): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2472 comm="mmap_t… 375 | enforcing | integer | No | The current IPE enforcing state 1 is in enforcing mode, 0 is… 504 …type=1404 audit(1653425689.008:55): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 ena… 508 …type=1404 audit(1653425689.008:55): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 ena… 519 | enforcing | integer | No | The enforcing state IPE is being switched to, 1 is in en… 521 … old_enforcing | integer | No | The enforcing state IPE is being switched from, 1 is in …
|
| /linux/tools/testing/selftests/kexec/ |
| H A D | kexec_common_lib.sh | 69 # /proc/device-tree/ibm,secureboot/os-secureboot-enforcing 73 local secure_boot_file="/proc/device-tree/ibm,secureboot/os-secureboot-enforcing"
|
| /linux/security/integrity/ima/ |
| H A D | ima_main.c | 483 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_file_mmap() 582 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_bprm_check() 613 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_creds_check() 631 * enforcing file integrity is left up to the discretion of the script 635 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_bprm_creds_for_exec() 660 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_file_check() 911 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_post_read_file() 999 * is in policy and IMA-appraisal is in enforcing mode, return -EACCES. in ima_post_load_data()
|
| /linux/security/lockdown/ |
| H A D | Kconfig | 2 bool "Basic module for enforcing kernel lockdown"
|
| /linux/security/landlock/ |
| H A D | Kconfig | 10 themselves (and their future children) by gradually enforcing
|
| H A D | tsync.c | 25 * Shared state between multiple threads which are enforcing Landlock rulesets 73 * all-or-nothing semantics for enforcing the new Landlock domain.
|
| H A D | domain.c | 114 * The current task is referenced as the domain that is enforcing the
|
| /linux/security/ipe/ |
| H A D | audit.c | 145 audit_log_format(ab, "ipe_op=%s ipe_hook=%s enforcing=%d pid=%d comm=", in ipe_audit_match() 272 "enforcing=%d old_enforcing=%d auid=%u ses=%u" in ipe_audit_enforce()
|
| /linux/security/tomoyo/ |
| H A D | Kconfig | 53 enforcing mode from the beginning, you can reduce the possibility of
|
| H A D | common.c | 19 [TOMOYO_CONFIG_ENFORCING] = "enforcing" 2190 * violated the policy in enforcing mode, TOMOYO_RETRY_REQUEST if the 2192 * enforcing mode, 0 if it is not in enforcing mode, -EPERM otherwise. 2320 * Waits for access requests which violated policy in enforcing mode. 2333 * tomoyo_read_query - Read access requests which violated policy in enforcing mode. 2453 [TOMOYO_STAT_POLICY_ENFORCING] = "violation in enforcing mode:",
|
| /linux/drivers/hv/ |
| H A D | Kconfig | 72 # The hypervisor interface operates on 4k pages. Enforcing it here
|
| /linux/security/loadpin/ |
| H A D | loadpin.c | 115 * enforcing mode. Otherwise, allow the root to be reestablished. in loadpin_sb_free_security() 157 * been unmounted while we are not in enforcing mode. Otherwise, it in loadpin_check()
|
| /linux/kernel/module/ |
| H A D | signing.c | 96 * without a valid signature on them, but if we're not enforcing, in module_sig_check()
|
| /linux/Documentation/core-api/ |
| H A D | protection-keys.rst | 7 Memory Protection Keys provide a mechanism for enforcing page-based
|
| /linux/kernel/ |
| H A D | Kconfig.preempt | 99 preemptible priority-inheritance aware variants, enforcing
|
| /linux/Documentation/arch/powerpc/ |
| H A D | dexcr.rst | 119 the hypervisor is enforcing the aspect be set. To see the true DEXCR state
|
| /linux/Documentation/userspace-api/ |
| H A D | check_exec.rst | 87 arbitrary code execution e.g., by enforcing a write xor execute policy.
|
| /linux/Documentation/security/ |
| H A D | landlock.rst | 42 * Computation related to Landlock operations (e.g. enforcing a ruleset) shall
|
| /linux/rust/kernel/drm/ |
| H A D | ioctl.rs | 134 // FIXME: Currently there is nothing enforcing that the types of the
|
| /linux/Documentation/rust/ |
| H A D | testing.rst | 65 (thus enforcing they are kept in sync with the code they document) and as well
|