| /Linux-v5.4/security/selinux/ss/ | 
| D | status.c | 56 			status->enforcing = enforcing_enabled(state);  in selinux_kernel_status_page()80 				      int enforcing)  in selinux_status_update_setenforce()  argument
 91 		status->enforcing = enforcing;  in selinux_status_update_setenforce()
 
 | 
| /Linux-v5.4/security/selinux/include/ | 
| D | security.h | 103 	bool enforcing;  member120 	return state->enforcing;  in enforcing_enabled()
 125 	state->enforcing = value;  in enforcing_set()
 373 	u32	enforcing;	/* current setting of enforcing mode */  member
 382 					     int enforcing);
 
 | 
| /Linux-v5.4/security/selinux/ | 
| D | Kconfig | 56 	  unless you specify enforcing=1 on the kernel command line.  You57 	  can interactively toggle the kernel between enforcing mode and
 
 | 
| D | selinuxfs.c | 283 	int enforcing;  in sel_write_disable()  local301 		enforcing = enforcing_enabled(fsi->state);  in sel_write_disable()
 308 			enforcing, enforcing,  in sel_write_disable()
 
 | 
| D | hooks.c | 116 	unsigned long enforcing;  in enforcing_setup()  local117 	if (!kstrtoul(str, 0, &enforcing))  in enforcing_setup()
 118 		selinux_enforcing_boot = enforcing ? 1 : 0;  in enforcing_setup()
 
 | 
| /Linux-v5.4/security/lockdown/ | 
| D | Kconfig | 2 	bool "Basic module for enforcing kernel lockdown"
 | 
| /Linux-v5.4/Documentation/admin-guide/cgroup-v1/ | 
| D | hugetlb.rst | 7 support page reclaim, enforcing the limit at page fault time implies that,
 | 
| /Linux-v5.4/kernel/ | 
| D | Kconfig.preempt | 65 	  preemptible priority-inheritance aware variants, enforcing
 | 
| /Linux-v5.4/security/tomoyo/ | 
| D | Kconfig | 55 	  enforcing mode from the beginning, you can reduce the possibility of
 | 
| D | common.h | 884 	struct tomoyo_preference *enforcing;  member
 | 
| /Linux-v5.4/Documentation/core-api/ | 
| D | protection-keys.rst | 15 Memory Protection Keys provides a mechanism for enforcing page-based
 | 
| /Linux-v5.4/Documentation/networking/device_drivers/qlogic/ | 
| D | LICENSE.qlcnic | 204 You are not responsible for enforcing compliance by third parties to
 | 
| D | LICENSE.qlge | 204 You are not responsible for enforcing compliance by third parties to
 | 
| /Linux-v5.4/Documentation/scsi/ | 
| D | LICENSE.qla2xxx | 206 You are not responsible for enforcing compliance by third parties to
 | 
| D | LICENSE.qla4xxx | 205 You are not responsible for enforcing compliance by third parties to
 | 
| /Linux-v5.4/Documentation/driver-api/ | 
| D | device_link.rst | 41 enforcing driver presence on the supplier is optional.
 | 
| /Linux-v5.4/Documentation/filesystems/caching/ | 
| D | cachefiles.txt | 397 located elsewhere when SELinux is in enforcing mode, please see:
 | 
| /Linux-v5.4/tools/usb/usbip/ | 
| D | COPYING | 194 You are not responsible for enforcing compliance by third parties to
 | 
| /Linux-v5.4/drivers/staging/rtl8192u/ | 
| D | copying | 194 You are not responsible for enforcing compliance by third parties to
 | 
| /Linux-v5.4/LICENSES/preferred/ | 
| D | GPL-2.0 | 213 You are not responsible for enforcing compliance by third parties to
 | 
| D | LGPL-2.1 | 373     herein. You are not responsible for enforcing compliance by third
 | 
| D | LGPL-2.0 | 355     herein. You are not responsible for enforcing compliance by third
 | 
| /Linux-v5.4/Documentation/admin-guide/hw-vuln/ | 
| D | l1tf.rst | 533     Disabling SMT and enforcing the L1D flushing provides the maximum
 | 
| /Linux-v5.4/arch/powerpc/ | 
| D | Kconfig | 929 	  Memory Protection Keys provides a mechanism for enforcing
 | 
| /Linux-v5.4/Documentation/filesystems/ | 
| D | fsverity.rst | 31 that fs-verity is enforcing for the file.  This ioctl executes in
 |