security_getenforce(3) — Linux manual page


security_getenforce(3)    SELinux API documentation   security_getenforce(3)

NAME         top

       security_getenforce,  security_setenforce, security_deny_unknown, se‐
       curity_reject_unknown, security_get_checkreqprot - get or set the en‐
       forcing state of SELinux

SYNOPSIS         top

       #include <selinux/selinux.h>

       int security_getenforce(void);

       int security_setenforce(int value);

       int security_deny_unknown(void);

       int security_reject_unknown(void);

       int security_get_checkreqprot(void);

DESCRIPTION         top

       security_getenforce() returns 0 if SELinux is running in permissive
       mode, 1 if it is running in enforcing mode, and -1 on error.

       security_setenforce() sets SELinux to enforcing mode if the value 1
       is passed in, and sets it to permissive mode if 0 is passed in.  On
       success 0 is returned, on error -1 is returned.

       security_deny_unknown() returns 0 if SELinux treats policy queries on
       undefined object classes or permissions as being allowed, 1 if such
       queries are denied, and -1 on error.

       security_reject_unknown() returns 1 if the current policy was built
       with handle-unknown=reject and SELinux would reject loading it, if it
       did not define all kernel object classes and permissions. In this
       state, when selinux_set_mapping() and selinux_check_access() are used
       with an undefined userspace class or permission, an error is returned
       and errno is set to EINVAL.

       It returns 0 if the current policy was built with handle-
       unknown=allow or handle-unknown=deny. In this state, policy queries
       are treated according to security_deny_unknown().  -1 is returned on

       security_get_checkreqprot() can be used to determine whether SELinux
       is configured to check the protection requested by the application or
       the actual protection that will be applied by the kernel (including
       the effects of READ_IMPLIES_EXEC) on mmap and mprotect calls.  It
       returns 0 if SELinux checks the actual protection, 1 if it checks the
       requested protection, and -1 on error.

SEE ALSO         top


COLOPHON         top

       This page is part of the selinux (Security-Enhanced Linux user-space
       libraries and tools) project.  Information about the project can be
       found at ⟨⟩.  If you
       have a bug report for this manual page, see
       ⟨⟩.  This
       page was obtained from the project's upstream Git repository
       ⟨⟩ on 2020-11-01.  (At that
       time, the date of the most recent commit that was found in the repos‐
       itory was 2020-10-31.)  If you discover any rendering problems in
       this HTML version of the page, or you believe there is a better or
       more up-to-date source for the page, or you have corrections or im‐
       provements to the information in this COLOPHON (which is not part of
       the original manual page), send a mail to           1 January 2004         security_getenforce(3)

Pages that refer to this page: and(3)selinux_status_close(3)selinux_status_deny_unknown(3)selinux_status_getenforce(3)selinux_status_open(3)selinux_status_policyload(3)selinux_status_updated(3)