/linux/security/selinux/ |
H A D | status.c | 56 status->enforcing = enforcing_enabled(); in selinux_kernel_status_page() 77 * It updates status of the current enforcing/permissive mode. 79 void selinux_status_update_setenforce(bool enforcing) in selinux_status_update_setenforce() argument 90 status->enforcing = enforcing ? 1 : 0; in selinux_status_update_setenforce()
|
/linux/security/selinux/include/ |
H A D | security.h | 96 bool enforcing; member 127 return READ_ONCE(selinux_state.enforcing); in enforcing_enabled() 132 WRITE_ONCE(selinux_state.enforcing, value); in enforcing_set() 383 u32 enforcing; /* current setting of enforcing mode */ member 391 extern void selinux_status_update_setenforce(bool enforcing);
|
/linux/Documentation/admin-guide/LSM/ |
H A D | ipe.rst | 197 enforcing the configurable policies at startup, around reading and 285 Deploying a policy will *not* cause IPE to start enforcing the policy. IPE will 319 enforced. This allows users to test policies before enforcing them. 337 type=1420 audit(1653364370.067:61): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2241 comm="ld-linux.so" path="/deny/lib/libc.so.6" dev="sda2" ino=14549020 rule="DEFAULT action=DENY" 341 type=1420 audit(1653364735.161:64): ipe_op=EXECUTE ipe_hook=MMAP enforcing=1 pid=2472 comm="mmap_test" path=? dev=? ino=? rule="DEFAULT action=DENY" 362 | enforcing | integer | No | The current IPE enforcing state 1 is in enforcing mode, 0 is in permissive mode | 491 type=1404 audit(1653425689.008:55): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=ipe res=1 495 type=1404 audit(1653425689.008:55): enforcing [all...] |
H A D | landlock.rst | 59 domain=195ba459b status=allocated mode=enforcing pid=300 uid=0 exe="/root/sandboxer" comm="sandboxer" 115 type=LANDLOCK_DOMAIN msg=audit(1729738800.268:30): domain=1a6fdc66f status=allocated mode=enforcing pid=286 uid=0 exe="/root/sandboxer" comm="sandboxer" 128 type=LANDLOCK_DOMAIN msg=audit(1729738800.221:33): domain=1a6fdc679 status=allocated mode=enforcing pid=289 uid=0 exe="/root/sandboxer" comm="sandboxer"
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-driver-ccp | 39 whether the PSP is enforcing rollback protection. 41 0: Not enforcing
|
/linux/security/landlock/ |
H A D | Kconfig | 10 themselves (and their future children) by gradually enforcing
|
/linux/security/lockdown/ |
H A D | Kconfig | 2 bool "Basic module for enforcing kernel lockdown"
|
/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | hugetlb.rst | 77 doesn't support page reclaim, enforcing the limit at page fault time implies 100 limit, enforcing memory usage at fault time and causing the application to
|
/linux/tools/perf/Documentation/ |
H A D | security.txt | 98 # enforcing - SELinux security policy is enforced. 99 # permissive - SELinux prints warnings instead of enforcing.
|
/linux/security/tomoyo/ |
H A D | Kconfig | 53 enforcing mode from the beginning, you can reduce the possibility of
|
/linux/Documentation/userspace-api/ |
H A D | mfd_noexec.rst | 34 migrating and enforcing non-executable MFD.
|
H A D | check_exec.rst | 87 arbitrary code execution e.g., by enforcing a write xor execute policy.
|
H A D | landlock.rst | 34 the thread enforcing it, and its future children. 47 Defining and enforcing a security policy 404 ABI version at runtime and only enforcing the supported features.
|
/linux/Documentation/core-api/ |
H A D | protection-keys.rst | 7 Memory Protection Keys provide a mechanism for enforcing page-based
|
/linux/Documentation/security/ |
H A D | landlock.rst | 42 * Computation related to Landlock operations (e.g. enforcing a ruleset) shall
|
H A D | ipe.rst | 120 integrity is independent of the policy for enforcing that integrity claim.
|
/linux/Documentation/driver-api/ |
H A D | extcon.rst | 93 This field is crucial for enforcing hardware constraints. It's an array of
|
H A D | device_link.rst | 37 enforcing driver presence on the supplier is optional.
|
/linux/Documentation/arch/powerpc/ |
H A D | dexcr.rst | 119 the hypervisor is enforcing the aspect be set. To see the true DEXCR state
|
/linux/Documentation/rust/ |
H A D | testing.rst | 65 (thus enforcing they are kept in sync with the code they document) and as well
|
/linux/Documentation/trace/coresight/ |
H A D | coresight-config.rst | 294 enforcing the unload order as the strict reverse of the load order.
|
/linux/Documentation/process/ |
H A D | code-of-conduct-interpretation.rst | 246 and kernel.org administrators in enforcing them.
|
/linux/LICENSES/preferred/ |
H A D | GPL-2.0 | 216 You are not responsible for enforcing compliance by third parties to
|
/linux/tools/usb/usbip/ |
H A D | COPYING | 194 You are not responsible for enforcing compliance by third parties to
|
/linux/Documentation/admin-guide/hw-vuln/ |
H A D | l1tf.rst | 533 Disabling SMT and enforcing the L1D flushing provides the maximum
|