Home
last modified time | relevance | path

Searched refs:enforcing (Results 1 – 25 of 31) sorted by relevance

12

/kernel/linux/linux-5.10/security/selinux/
Dstatus.c56 status->enforcing = enforcing_enabled(state); in selinux_kernel_status_page()
80 int enforcing) in selinux_status_update_setenforce() argument
91 status->enforcing = enforcing; in selinux_status_update_setenforce()
DKconfig59 unless you specify enforcing=1 on the kernel command line. You
60 can interactively toggle the kernel between enforcing mode and
Dselinuxfs.c285 int enforcing; in sel_write_disable() local
310 enforcing = enforcing_enabled(fsi->state); in sel_write_disable()
317 enforcing, enforcing, in sel_write_disable()
Dhooks.c117 unsigned long enforcing; in enforcing_setup() local
118 if (!kstrtoul(str, 0, &enforcing)) in enforcing_setup()
119 selinux_enforcing_boot = enforcing ? 1 : 0; in enforcing_setup()
/kernel/linux/linux-5.10/security/selinux/include/
Dsecurity.h95 bool enforcing; member
128 return READ_ONCE(state->enforcing); in enforcing_enabled()
133 WRITE_ONCE(state->enforcing, value); in enforcing_set()
437 u32 enforcing; /* current setting of enforcing mode */ member
446 int enforcing);
/kernel/linux/linux-5.10/security/lockdown/
DKconfig2 bool "Basic module for enforcing kernel lockdown"
/kernel/linux/linux-5.10/Documentation/admin-guide/cgroup-v1/
Dhugetlb.rst71 doesn't support page reclaim, enforcing the limit at page fault time implies
92 limit, enforcing memory usage at fault time and causing the application to
/kernel/linux/linux-5.10/kernel/
DKconfig.preempt65 preemptible priority-inheritance aware variants, enforcing
/kernel/linux/linux-5.10/tools/perf/Documentation/
Dsecurity.txt98 # enforcing - SELinux security policy is enforced.
99 # permissive - SELinux prints warnings instead of enforcing.
/kernel/linux/linux-5.10/security/tomoyo/
DKconfig55 enforcing mode from the beginning, you can reduce the possibility of
Dcommon.h884 struct tomoyo_preference *enforcing; member
/kernel/linux/linux-5.10/Documentation/core-api/
Dprotection-keys.rst16 Memory Protection Keys provides a mechanism for enforcing page-based
/kernel/linux/linux-5.10/Documentation/driver-api/
Ddevice_link.rst37 enforcing driver presence on the supplier is optional.
/kernel/linux/linux-5.10/Documentation/filesystems/caching/
Dcachefiles.rst377 located elsewhere when SELinux is in enforcing mode, please see::
/kernel/linux/linux-5.10/tools/usb/usbip/
DCOPYING194 You are not responsible for enforcing compliance by third parties to
/kernel/linux/build/
DLICENSE194 You are not responsible for enforcing compliance by third parties to
/kernel/linux/common_modules/newip/third_party/linux-5.10/LICENSES/
DGPL-2.0213 You are not responsible for enforcing compliance by third parties to
/kernel/linux/config/
DLICENSE194 You are not responsible for enforcing compliance by third parties to
/kernel/linux/patches/
DLICENSE194 You are not responsible for enforcing compliance by third parties to
/kernel/linux/linux-5.10/LICENSES/preferred/
DGPL-2.0213 You are not responsible for enforcing compliance by third parties to
DLGPL-2.1373 herein. You are not responsible for enforcing compliance by third
DLGPL-2.0355 herein. You are not responsible for enforcing compliance by third
/kernel/linux/common_modules/
DLICENSES-GPL-2.0213 You are not responsible for enforcing compliance by third parties to
/kernel/linux/linux-5.10/Documentation/admin-guide/hw-vuln/
Dl1tf.rst533 Disabling SMT and enforcing the L1D flushing provides the maximum
/kernel/linux/linux-5.10/arch/powerpc/
DKconfig960 Memory Protection Keys provides a mechanism for enforcing

12