/external/selinux/libselinux/man/man8/ |
setenforce.8 | 7 .RB [ Enforcing | Permissive | 1 | 0 ] 11 .B Enforcing 14 to put SELinux in enforcing mode.
|
getenforce.8 | 10 reports whether SELinux is enforcing, permissive, or disabled.
|
/external/selinux/policycoreutils/sepolicy/sepolicy/help/ |
system_boot_mode.txt | 4 * Enforcing mode (Default) 7 - SELinux prints warnings instead of enforcing. 11 You can use this screen to change the enforcing mode.
|
system_current_mode.txt | 1 You can switch SELinux between Enforcing mode and Permissive mode. 4 When a machine is in permissive mode, SELinux will continue to log SELinux AVC messages, that would have been denied if the machine was in enforcing mode.
|
lockdown_permissive.txt | 6 When the distribution policy writers write a new confined domain, they initially ship the policy for that domain in permissive mode. Permissive mode means that a process running in the domain will not be confined by SELinux. The kernel will log the AVC messages, access denials, that would have happened had the process been run in enforcing mode. 8 Permissive domain policies are experimental and will be turned to enforcing in future Operation System Releases.
|
/external/toybox/toys/android/ |
getenforce.c | 14 Shows whether SELinux is disabled, enforcing, or permissive. 26 if (ret == -1) perror_exit("Couldn't get enforcing status"); 27 else puts(ret ? "Enforcing" : "Permissive");
|
setenforce.c | 12 usage: setenforce [enforcing|permissive|1|0] 14 Sets whether SELinux is enforcing (1) or permissive (0). 26 else if (!strcmp(new, "1") || !strcasecmp(new, "enforcing")) state = 1; 31 if (ret == -1) perror_msg("Couldn't set enforcing status to '%s'", new);
|
/external/selinux/libselinux/man/man3/ |
security_getenforce.3 | 3 security_getenforce, security_setenforce, security_deny_unknown \- get or set the enforcing state of SELinux 17 enforcing mode, and \-1 on error. 20 sets SELinux to enforcing mode if the value 1 is passed in, and sets it to
|
selinux_getenforcemode.3 | 3 selinux_getenforcemode \- get the enforcing state of SELinux 18 to 1 if SELinux should be run in enforcing mode.
|
security_load_policy.3 | 34 enforcing mode, sets the 37 enforcing status to match it, and loads the policy. It also internally 48 in enforcing one).
|
avc_open.3 | 47 This option forces the userspace AVC into enforcing mode if the option value is non-NULL; permissive mode otherwise. The system enforcing mode will be ignored. 50 Beginning with version 2.6.4, the Linux kernel supports SELinux status change notification via netlink. Two message types are currently implemented, indicating changes to the enforcing mode and to the loaded policy in the kernel, respectively. The userspace AVC listens for these messages and takes the appropriate action, modifying the behavior of 52 to reflect the current enforcing mode and flushing the cache on receipt of a policy load notification. Audit messages are produced when netlink notifications are processed.
|
selinux_set_callback.3 | 85 .BI "int (*" func_setenforce ") (int " enforcing ");" 87 This callback is invoked when the system enforcing state changes. 89 .I enforcing 92 for enforcing mode, and
|
/external/selinux/libselinux/utils/ |
setenforce.c | 11 fprintf(stderr, "usage: %s [ Enforcing | Permissive | 1 | 0 ]\n", 30 if (strcasecmp(argv[1], "enforcing") == 0) {
|
getenforce.c | 24 puts("Enforcing");
|
/external/clang/test/CXX/temp/temp.names/ |
p2.cpp | 4 // Ensure that when enforcing access control an unqualified template name with
|
/external/libselinux/src/ |
callbacks.h | 25 (*selinux_netlink_setenforce) (int enforcing) hidden;
|
sestatus.c | 26 uint32_t enforcing; /* current setting of enforcing mode */ member in struct:selinux_status_t 129 * 1 means currently we run in enforcing mode, or 0 means permissive mode. 134 uint32_t enforcing; local 152 enforcing = selinux_status->enforcing; 156 return enforcing ? 1 : 0; 230 static int fallback_cb_setenforce(int enforcing) 233 fallback_enforcing = enforcing;
|
callbacks.c | 41 default_selinux_setenforce(int enforcing __attribute__((unused))) 66 (*selinux_netlink_setenforce) (int enforcing) =
|
/external/selinux/libselinux/src/ |
callbacks.h | 25 (*selinux_netlink_setenforce) (int enforcing) hidden;
|
sestatus.c | 26 uint32_t enforcing; /* current setting of enforcing mode */ member in struct:selinux_status_t 129 * 1 means currently we run in enforcing mode, or 0 means permissive mode. 134 uint32_t enforcing; local 152 enforcing = selinux_status->enforcing; 156 return enforcing ? 1 : 0; 230 static int fallback_cb_setenforce(int enforcing) 233 fallback_enforcing = enforcing;
|
callbacks.c | 42 default_selinux_setenforce(int enforcing __attribute__((unused))) 67 (*selinux_netlink_setenforce) (int enforcing) =
|
/external/selinux/policycoreutils/load_policy/ |
load_policy.8 | 36 Initial policy load failed and enforcing mode requested
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
PinListEntry.java | 42 private final boolean enforcing; field in class:PinListEntry 53 return enforcing; 72 enforcing = enforcementValueFromString(values[1]); 90 * <p>If enforcing is on and the given {@code chain} does not include the 107 return !enforcing || containsUserCert; 154 PinFailureLogger.log(cn, containsUserCert, enforcing, chain);
|
/docs/source.android.com/src/devices/tech/security/selinux/ |
index.jd | 46 <p>Android includes SELinux in enforcing mode and a corresponding security policy 47 that works by default across the <a href="https://android.googlesource.com/">Android Open Source Project</a>. In enforcing mode, illegitimate actions are prevented and all attempted 49 may refine their software and SELinux policies before enforcing them.</p> 56 enforcing mode, in which denials are both logged and enforced. SELinux also 58 be made permissive while placing the rest of the system in global enforcing 64 while keeping the rest of the system enforcing.</p> 74 <li> Everything is in enforcing mode in the 5.0 release
|
/external/selinux/policycoreutils/gui/ |
statusPage.py | 31 ENFORCING = 1 34 modearray = ( "disabled", "permissive", "enforcing" ) 68 if self.get_current_mode() == ENFORCING or self.get_current_mode() == PERMISSIVE: 70 self.currentOptionMenu.append_text(_("Enforcing")) 99 return ENFORCING 160 def write_selinux_config(self, enforcing, type): 169 fd.write("SELINUX=%s\n" % enforcing)
|