/external/selinux/libselinux/man/man8/ |
selinux.8 | 19 permissive mode or enforcing mode. The 22 any one of disabled, permissive, or enforcing to select one of these 27 policy are permitted but audited. The enforcing option enables the 30 than enforcing mode, both because enforcing mode will prevent an
|
/external/selinux/policycoreutils/man/man5/ |
selinux_config.5 | 132 This example \fIconfig\fR file shows the minimum contents for a system to run SELinux in enforcing mode, with a \fIpolicy_name\fR of 'targeted': 135 SELINUX = enforcing
|
/external/selinux/policycoreutils/sepolicy/ |
selinux_server.py | 88 def write_selinux_config(self, enforcing=None, policy=None): 96 if enforcing and l.startswith("SELINUX="): 97 fd.write("SELINUX=%s\n" % enforcing) 112 values = [ "enforcing", "permissive", "disabled" ] 115 self.write_selinux_config(enforcing=value)
|
sepolicy-generate.8 | 60 .B Type Enforcing File NAME.te 65 Policy generated by \fBsepolicy generate\fP will automatically add a permissive DOMAIN to your te file. When you are satisfied that your policy works, you need to remove the permissive line from the te file to run your domain in enforcing mode.
|
/external/selinux/policycoreutils/load_policy/ |
load_policy.c | 78 /* SELinux in enforcing mode but load_policy failed */ 80 _("%s: Can't load policy and enforcing mode requested: %s\n"),
|
/external/elfutils/src/ |
README | 9 whatsoever. We are enforcing this in the code. The modules and their
|
/docs/source.android.com/src/devices/tech/security/selinux/ |
validate.jd | 34 <p>This will print the global SELinux mode: either Disabled, Enforcing, or 43 release in permissive mode and eventual switch to enforcing mode. SELinux log 53 enforcing mode and why. Here is an example:</p> 98 enforcing mode is enabled.</p> 112 androidboot.selinux=enforcing
|
/libcore/libart/src/main/java/java/lang/reflect/ |
Field.java | 274 * <p>If this Field object is enforcing access control (see AccessibleObject) 300 * If this Field object is enforcing access control (see AccessibleObject) 326 * If this Field object is enforcing access control (see AccessibleObject) 352 * If this Field object is enforcing access control (see AccessibleObject) 378 * If this Field object is enforcing access control (see AccessibleObject) 404 * If this Field object is enforcing access control (see AccessibleObject) 430 * If this Field object is enforcing access control (see AccessibleObject) 456 * If this Field object is enforcing access control (see AccessibleObject) 482 * If this Field object is enforcing access control (see AccessibleObject) 508 * <p>If this Field object is enforcing access control (see AccessibleObject [all...] |
/external/selinux/libselinux/src/ |
load_policy.c | 326 * Get desired mode (disabled, permissive, enforcing) from 342 (tmp = strstr(buf, "enforcing="))) { 345 atoi(tmp + sizeof("enforcing=") - 1); 396 * commandline enforcing setting. 432 * If necessary, change the kernel enforcing status to match 441 fprintf(stderr, "SELinux: Unable to switch to %s mode: %s\n", (*enforce ? "enforcing" : "permissive"), strerror(errno));
|
avc_internal.c | 48 /* message prefix string and avc enforcing mode */ 180 "%s: received setenforce notice (enforcing=%d)\n",
|
/cts/tests/tests/security/src/android/security/cts/ |
KernelSettingsTest.java | 38 * Ensure that SELinux is in enforcing mode. 49 * Protect against kernel based NULL pointer attacks by enforcing a
|
/docs/source.android.com/src/devices/tech/security/enhancements/ |
enhancements44.jd | 12 Android now uses SELinux in enforcing mode. SELinux is a mandatory
|
enhancements50.jd | 19 requires SELinux in enforcing mode for all domains. SELinux is a
|
/external/selinux/libselinux/man/man3/ |
avc_netlink_loop.3 | 64 Callbacks for policyload and enforcing changes will be called;
|
avc_init.3 | 157 Beginning with version 2.6.4, the Linux kernel supports SELinux status change notification via netlink. Two message types are currently implemented, indicating changes to the enforcing mode and to the loaded policy in the kernel, respectively. The userspace AVC listens for these messages and takes the appropriate action, modifying the behavior of 159 to reflect the current enforcing mode and flushing the cache on receipt of a policy load notification. Audit messages are produced when netlink notifications are processed.
|
/external/selinux/policycoreutils/sestatus/ |
sestatus.8 | 30 Mode from config file: enforcing
|
/frameworks/base/core/res/res/layout/ |
global_actions_item.xml | 17 <!-- RelativeLayouts have an issue enforcing minimum heights, so just
|
/external/conscrypt/src/test/java/org/conscrypt/ |
CertPinManagerTest.java | 149 assertTrue("Not enforcing!", e.getEnforcing()); 161 assertTrue("Not enforcing!", e.getEnforcing()); 173 assertFalse("Enforcing!", e.getEnforcing());
|
/external/openssh/openbsd-compat/ |
port-linux.c | 93 "context for %s (in enforcing mode)", 128 "for %s (in enforcing mode)", __func__, pwname); 152 /* XXX: should these calls fatal() upon failure in enforcing mode? */
|
/external/compiler-rt/lib/asan/scripts/ |
asan_device_setup | 311 ENFORCING=0 312 if adb_shell getenforce | grep Enforcing >/dev/null; then 315 ENFORCING=1 331 if [ $ENFORCING == 1 ]; then
|
/external/libselinux/src/ |
avc_internal.c | 48 /* message prefix string and avc enforcing mode */ 180 "%s: received setenforce notice (enforcing=%d)\n",
|
/frameworks/base/core/java/android/os/ |
SELinux.java | 47 * Determine whether SELinux is permissive or enforcing. 48 * @return a boolean indicating whether SELinux is enforcing.
|
/external/selinux/policycoreutils/newrole/ |
newrole.c | 683 int enforcing = security_getenforce(); local 690 if (enforcing < 0) { 691 fprintf(stderr, _("Could not determine enforcing mode.\n")); 706 enforcing ? "Error" : "Warning", ttyn); 707 if (enforcing) 716 enforcing ? "Error" : "Warning", ttyn); 717 if (enforcing) 725 enforcing ? "Error" : "Warning", ttyn); 728 if (enforcing) 1057 fprintf(stderr, _("Could not determine enforcing mode.\n")) [all...] |
/frameworks/base/docs/html/training/enterprise/ |
device-management-policy.jd | 40 its content by enforcing device management policies. Specifically, the application can be configured 116 <p>Before enforcing any policies, the user needs to manually activate the application as a device 152 configuring and enforcing the policy.</p>
|
/external/boringssl/src/include/openssl/ |
type_check.h | 67 /* This header file contains some common macros for enforcing type checking.
|